Cargando…

Oracle cloud user security : providing for separation of duties and appropriate access by job function.

"Enhance the security of your Oracle cloud environment by providing users appropriate access for their respective job functions, and by providing for separation of duties such that no single user has enough access by which to exceed their level of authority. See how to think through and plan fo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Malcher, Michelle (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Apress, 2019.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1138875846
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 200203s2019 xx 063 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d ALSTP  |d OCLCO  |d OCL  |d CZL  |d DST  |d OCLCQ  |d OCLCO 
019 |a 1295606775  |a 1300438139  |a 1303360837 
020 |z 9781484255643 
024 8 |a 9781484255643 
029 1 |a AU@  |b 000068131481 
035 |a (OCoLC)1138875846  |z (OCoLC)1295606775  |z (OCoLC)1300438139  |z (OCoLC)1303360837 
037 |a CL0501000090  |b Safari Books Online 
050 4 |a QA76.585 
049 |a UAMI 
100 1 |a Malcher, Michelle,  |e speaker. 
245 1 0 |a Oracle cloud user security :  |b providing for separation of duties and appropriate access by job function. 
264 1 |a [Place of publication not identified] :  |b Apress,  |c 2019. 
300 |a 1 online resource (1 streaming video file (1 hr., 3 min.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
500 |a Title from resource description page (Safari, viewed January 17, 2020). 
511 0 |a Presenter, Michelle Malcher. 
520 |a "Enhance the security of your Oracle cloud environment by providing users appropriate access for their respective job functions, and by providing for separation of duties such that no single user has enough access by which to exceed their level of authority. See how to think through and plan for the access requirements of technical experts such as cloud administrators and database administrators through to business-level users such as those accessing cloud applications and databases. Make use of your own enterprise identity management system, or use Oracle Identity Cloud Service."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cloud computing. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Infonuagique. 
650 6 |a Sécurité informatique. 
650 7 |a Cloud computing.  |2 fast  |0 (OCoLC)fst01745899 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 7 |a Instructional films.  |2 fast  |0 (OCoLC)fst01726236 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
856 4 0 |u https://learning.oreilly.com/videos/~/9781484255643/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Alexander Street  |b ALSP  |n ASP4691314/marc 
994 |a 92  |b IZTAP