Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000uam a2200397 a 4500 
003    CaSebORM 
005    20210827201019.2 
006    m     o  d         
007    cr cn          
008    031119s2019    xx      o         0 eng   
024 8  9781484253663 
024 8  9781484253670 
035    (CaSebORM)9781484253670 
041 0  eng 
099    eBook O’Reilly for Public Libraries 
100 1  Mustafa, Osama,|eauthor. 
245 10 Oracle Database Application Security: |bWith Oracle 
       Internet Directory, Oracle Access Manager, and Oracle 
       Identity Manager|h[O'Reilly electronic resource] /
       |cMustafa, Osama. 
250    1st edition 
264  1 |bApress,|c2019. 
300    1 online resource (351 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
365    |b29.99 
520    Focus on the security aspects of designing, building, and 
       maintaining a secure Oracle Database application. Starting
       with data encryption, you will learn to work with 
       transparent data, back-up, and networks. You will then go 
       through the key principles of audits, where you will get 
       to know more about identity preservation, policies and 
       fine-grained audits. Moving on to virtual private 
       databases, you'll set up and configure a VPD to work in 
       concert with other security features in Oracle, followed 
       by tips on managing configuration drift, profiles, and 
       default users. Shifting focus to coding, you will take a 
       look at secure coding standards, multi-schema database 
       models, code-based access control, and SQL injection. 
       Finally, you'll cover single sign-on (SSO), and will be 
       introduced to Oracle Internet Directory (OID), Oracle 
       Access Manager (OAM), and Oracle Identity Management (OIM)
       by installing and configuring them to meet your needs. 
       Oracle databases hold the majority of the world's 
       relational data, and are attractive targets for attackers 
       seeking high-value targets for data theft. Compromise of a
       single Oracle Database can result in tens of millions of 
       breached records costing millions in breach-mitigation 
       activity. This book gets you ready to avoid that nightmare
       scenario. What You Will Learn Work with Oracle Internet 
       Directory using the command-line and the console Integrate
       Oracle Access Manager with different applications Work 
       with the Oracle Identity Manager console and connectors, 
       while creating your own custom one Troubleshooting issues 
       with OID, OAM, and OID Dive deep into file system and 
       network security concepts Who This Book Is For Oracle DBAs
       and developers. Readers will need a basic understanding of
       Oracle RDBMS and Oracle Application Server to take 
       complete advantage of this book. 
533    Electronic reproduction.|bBoston, MA :|cSafari,|nAvailable
       via World Wide Web.|d2019. 
538    Mode of access: World Wide Web. 
542    |f© Copyright 2019 Osama Mustafa, Robert P. Lockard.|g2019
550    Made available through: Safari, an O'Reilly Media Company.
588 00 Online resource; Title from title page (viewed October 31,
655  7 Electronic books.|2local 
700 1  Lockard, Robert,|eauthor. 
710 2  Safari, an O'Reilly Media Company. 
856 40 |zAvailable on O’Reilly for Public Libraries|uhttps://