Cargando…

Oracle database application security : with Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager /

Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more about...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Mustafa, Osama (Autor), Lockard, Robert P. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Apress, [2019]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1126540060
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 191106s2019 nyua o 001 0 eng d
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d EBLCP  |d TEFOD  |d OCLCF  |d ESU  |d UPM  |d VT2  |d UMI  |d OCLCQ  |d UKAHL  |d K6U  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ 
019 |a 1129279797  |a 1135217538  |a 1137352841  |a 1138968031 
020 |a 9781484253670  |q (electronic bk.) 
020 |a 1484253671  |q (electronic bk.) 
020 |a 1484253663 
020 |a 9781484253663 
020 |a 9781484253687  |q (print) 
020 |a 148425368X 
020 |z 9781484253663 
024 7 |a 10.1007/978-1-4842-5367-0  |2 doi 
029 1 |a AU@  |b 000066228935 
029 1 |a AU@  |b 000066260740 
029 1 |a AU@  |b 000066276790 
029 1 |a AU@  |b 000070460268 
035 |a (OCoLC)1126540060  |z (OCoLC)1129279797  |z (OCoLC)1135217538  |z (OCoLC)1137352841  |z (OCoLC)1138968031 
037 |a 8F9A96A9-C356-42D6-B0EE-D582B0443F37  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.D314  |b M87 2019eb 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.75/65  |2 23 
049 |a UAMI 
100 1 |a Mustafa, Osama,  |e author. 
245 1 0 |a Oracle database application security :  |b with Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager /  |c Osama Mustafa, Robert P. Lockard. 
264 1 |a New York :  |b Apress,  |c [2019] 
264 4 |c ©2019 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed November 6, 2019). 
500 |a Includes index. 
505 0 |a Chapter 01 -- Encryption -- Chapter 02 -- Audit -- Chapter 03 -- Privilege Analysis -- Chapter 04 -- Oracle Database threats -- Chapter 05 -- Network access and Evaluation -- Chapter 06 -- Coding -- Chapter 07 -- Single Sign On (SSO). 
520 |a Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more about identity preservation, policies and fine-grained audits. Moving on to virtual private databases, you'll set up and configure a VPD to work in concert with other security features in Oracle, followed by tips on managing configuration drift, profiles, and default users. Shifting focus to coding, you will take a look at secure coding standards, multi-schema database models, code-based access control, and SQL injection. Finally, you'll cover single sign-on (SSO), and will be introduced to Oracle Internet Directory (OID), Oracle Access Manager (OAM), and Oracle Identity Management (OIM) by installing and configuring them to meet your needs. Oracle databases hold the majority of the world's relational data, and are attractive targets for attackers seeking high-value targets for data theft. Compromise of a single Oracle Database can result in tens of millions of breached records costing millions in breach-mitigation activity. This book gets you ready to avoid that nightmare scenario. You will: Work with Oracle Internet Directory using the command-line and the console Integrate Oracle Access Manager with different applications Work with the Oracle Identity Manager console and connectors, while creating your own custom one Troubleshooting issues with OID, OAM, and OID Dive deep into file system and network security concepts. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Oracle (Computer file) 
630 0 7 |a Oracle (Computer file)  |2 fast  |0 (OCoLC)fst01363816 
650 0 |a Database security. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 7 |a Database security.  |2 fast  |0 (OCoLC)fst00888063 
700 1 |a Lockard, Robert P.,  |e author. 
776 0 8 |i Printed edition:  |z 9781484253663 
776 0 8 |i Printed edition:  |z 9781484253687 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484253670/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36971419 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5970608 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5970531 
994 |a 92  |b IZTAP