Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Effective Oracle Database 10g Security by Design

Buy

The database has two important roles: 1. Serve the data—databases are commonly referred to as data servers; 2. Protect the data. Yes that’s right, the database is there to serve and protect. Database security features are vast and complex. While the complexity can afford us many ways to provide a robust database application, it also can be very confusing. Users need to know what is available, when to use it, when not to use it, and how it can be leveraged with other complementary technologies. Knowledge is power. Not utilizing these features is analogous to the blinking 12:00 on the VCR—you are not getting your money’s worth.

Effective Oracle Database 10g Security by Design provides solutions for the Oracle security puzzle and includes the new Oracle Database 10g features. Recommendations, best practices, and code examples lead the reader through examples that illustrate how to build secure applications. This book shows how to effectively utilize, in a complementary manner, the most common Oracle product features: proxy authentication, secure application roles, Enterprise Users, Virtual Private Database, Oracle Label Security, database encryption, and standard and fine-grained auditing. Web applications and client-server applications are addressed as well as PL/SQL programming security best practices. The explanations allow a non-security expert to grasp the relevance of the technology, and the countless examples comprehensively show the different nuances associated with each technology. All of the information will allow you to effectively design, develop, and deploy secure database applications.

This book is targeted to Oracle Database application developers, Oracle DBAs, and anyone whose role is to ensure that proper procedures and due diligence have been followed in building applications (CIO’s, CISO’s, etc.). This book is about designing, building, and deploying secure applications running against an Oracle Database. The challenge faced for people wishing to do this today is that there are few, if any, best practice documents, technical blueprints (architectures), or other reference guidelines showing how to link together varying technologies to build secure database applications.

row-level security with views, VPD, OLS, and the new DBMS_CRYPTO encryption package. The new Oracle Database 10g features aren’t alluded to or quickly summarized but rather are presented in comprehensive yet easy-to-understand detail.

Throughout the book, careful attention has been paid to provide enough information to describe a technology without being redundant with Oracle Corporation’s existing documentation. Since it’s useful to be pointed to the place in the official documentation that describes a technology, you’ll see references to other documents throughout the book. Unless otherwise noted, the documents are part of Oracle Corporation’s product documentation, which can be retrieved from the Oracle Technology Network web site at http://otn.oracle.com.

(HTML tags aren't allowed.)

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Leading IT Projects: The IT Manager's Guide
Leading IT Projects: The IT Manager's Guide
Senior level IT managers are responsible for a wide variety of development projects. For the most part, these individual projects are handled by project managers. However, IT managers must be conversant in the field of project management. Additionally, they must understand the dynamics of managing the project manager and be familiar with the skill...
Embracing Insanity: Open Source Software Development
Embracing Insanity: Open Source Software Development
In this book, you will learn where the Open Source movement comes from and what motivates its adherents. You will be introduced to the culture that fuels the movement, as well as the personalities and organizations that promote its growth. You will also understand the strengths of the Open Source movement and how it changes the way in which...

Applications of Electrochemistry in Medicine (Modern Aspects of Electrochemistry)
Applications of Electrochemistry in Medicine (Modern Aspects of Electrochemistry)

Medical Applications of Electrochemistry, a volume of the series Modern Aspects of Electrochemistry, illustrates the interdisciplinary nature of modern science by indicating the many current issues in medicine that are susceptible to solution by electrochemical methods. This book also suggests how personalized medicine can develop.

...
Oracle JDeveloper 10g: Empowering J2EE Development (Expert's Voice)
Oracle JDeveloper 10g: Empowering J2EE Development (Expert's Voice)

The age for using a simple text editor is long gone. The ever-growing complexity of Java and J2Ee creates a need for Java development tools that offer more. If you want to be more productive with Java, you need a Java Ide. Oracle Jdeveloper 10g is an Ide that enables you to develop Java applications with minimal effort. Jdeveloper...

Joomla! For Dummies (Computer/Tech)
Joomla! For Dummies (Computer/Tech)

With its pre-coded modules, open source Joomla! is popular for building interactive Web sites without writing code. This Web site design tool lets you build sites with discussions, polling, RSS feeds, picture submissions, shopping carts, and a lot more, quickly and easily and the quickest, easiest way to learn how to use it is Joomla! For...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy