|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn908199970 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150430s2015 nyua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d DEBBG
|d OCLCF
|d DEBSZ
|d TOH
|d RDF
|d LVT
|d S4S
|d OCLCQ
|d EBLCP
|d YDX
|d OCLCO
|d OCLCQ
|d N$T
|d OCLCO
|
019 |
|
|
|a 914291845
|a 1076642776
|a 1165388913
|a 1175674678
|a 1381245840
|
020 |
|
|
|a 9780071822961
|q (electronic bk.)
|
020 |
|
|
|a 0071822968
|q (electronic bk.)
|
020 |
|
|
|z 9780071824286
|
020 |
|
|
|z 0071824286
|
029 |
1 |
|
|a DEBBG
|b BV042683265
|
029 |
1 |
|
|a DEBSZ
|b 446584703
|
035 |
|
|
|a (OCoLC)908199970
|z (OCoLC)914291845
|z (OCoLC)1076642776
|z (OCoLC)1165388913
|z (OCoLC)1175674678
|z (OCoLC)1381245840
|
037 |
|
|
|a CL0500000583
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gaetjen, Scott,
|e author.
|
245 |
1 |
0 |
|a Oracle database 12c security /
|c Scott Gaetjen, David Knox, William Maroulis.
|
246 |
3 |
0 |
|a Oracle database twelve c security
|
264 |
|
1 |
|a New York :
|b McGraw-Hill Education,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
500 |
|
|
|a Includes index.
|
520 |
8 |
|
|a David Knox, the most well-respected and notable Oracle security expert, provides the trusted advice and latest best practices for comprehensive Oracle Database security.
|b Best Practices for Comprehensive Oracle Database SecurityWritten by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples. Connect users to databases in a secure mannerManage identity, authentication, and access controlImplement database application securityProvide security policies across enterprise applications using Real Application SecurityControl data access with OracleVirtual Private DatabaseControl sensitive data using data redaction and transparent sensitive data protectionControl data access with Oracle Label SecurityUse Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threatsImplement auditing technologies, including Unified Audit TrailManage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- About the Author -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Essential Database Security -- Chapter 1: Security for Today's World -- The Security Landscape -- Base Assumptions -- Database Security Today -- Evolving Security Technologies -- Security Motivators -- Sensitive Data Categorization -- Principles -- Summary -- Chapter 2: Essential Elements of User Security -- Understanding Identification and Authentication -- Identification Methods -- Authentication -- Understanding Database Account Types
|
505 |
8 |
|
|a Database Account Types in Oracle Database 12c Multitenant Architecture -- Privileged Database Account Management in Oracle Database 12c -- Administrative Privileges for Separation of Duty -- Methods for Privileged Database Account Management -- Account Management in Multitenant Oracle Database 12c -- Creating Common Database Accounts -- Managing Accounts in a Pluggable Database -- Managing Database Account Passwords and Profiles -- Managing Passwords for Local Database Accounts -- Managing Database Account Profiles -- Summary -- Chapter 3: Connection Pools and Enterprise Users
|
505 |
8 |
|
|a External Identification and Authentication Challenges -- Connection Challenges -- Performance -- Connection Pools -- Security Risks -- External Identification and Authentication in Oracle Database 12c -- Oracle Proxy Authentication -- Oracle Enterprise User Security -- Oracle Kerberos Authentication -- Oracle RADIUS Authentication -- Summary -- Chapter 4: Foundational Elements for a Secure Database -- Access Control, Authorization, and Privilege -- Access Control -- Authorization -- Privilege -- Object Privileges -- Column Privileges -- Synonyms -- System and Object Privileges Together
|
505 |
8 |
|
|a Privilege Conveyance and Retraction -- Roles -- Role and Privilege Immediacy -- Roles and Container Databases -- Public and Default Database Roles -- Role Hierarchies -- Object Privileges Through Roles and PL/SQL -- Selective Privilege Enablement -- Selective Privilege Use Cases -- Password-Protected Roles -- Password-Protected Role Example -- Password-Protected Roles and Proxy Authentication -- Challenges to Securing the Password -- Secure Application Roles -- Secure Application Role Example -- Global Roles and Enterprise Roles -- Creating and Assigning Global and Enterprise Roles
|
505 |
8 |
|
|a Combining Standard and Global Roles -- Using Roles Wisely -- Too Many Roles -- Naming -- Dependencies -- Summary -- Chapter 5: Foundational Elements of Database Application Security -- Application Context -- Default Application Context (USERENV) -- Auditing with USERENV -- Database Session-Based Application Context -- Creating a Database Session-Based Application Context -- Setting Context Attributes and Values -- Applying the Application Context to Security -- Secure Use -- Common Mistakes -- Global Application Context -- GAC Uses -- GAC Example -- Global Context Memory Usage
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Oracle (Computer file)
|
630 |
0 |
7 |
|a Oracle (Computer file)
|2 fast
|
650 |
|
0 |
|a Database security.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Database security
|2 fast
|
700 |
1 |
|
|a Knox, David
|q (David Christopher),
|e author.
|
700 |
1 |
|
|a Maroulis, William,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Gaetjen, Scott.
|t Oracle database 12c security
|z 9780071824286
|w (DLC) 2014044429
|w (OCoLC)875520327
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071824286/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6258864
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16841014
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2686793
|
994 |
|
|
|a 92
|b IZTAP
|