Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Gaetjen, Scott, author.

Title Oracle database 12c security / Scott Gaetjen, David Knox, William Maroulis. [O'Reilly electronic resource]

Publication Info. New York : McGraw-Hill Education, [2015]
©2015
QR Code
Description 1 online resource (1 volume) : illustrations
Note Includes index.
Summary David Knox, the most well-respected and notable Oracle security expert, provides the trusted advice and latest best practices for comprehensive Oracle Database security. Best Practices for Comprehensive Oracle Database SecurityWritten by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples. Connect users to databases in a secure mannerManage identity, authentication, and access controlImplement database application securityProvide security policies across enterprise applications using Real Application SecurityControl data access with OracleVirtual Private DatabaseControl sensitive data using data redaction and transparent sensitive data protectionControl data access with Oracle Label SecurityUse Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threatsImplement auditing technologies, including Unified Audit TrailManage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control.
Contents Cover -- Title Page -- Copyright Page -- Dedication -- About the Author -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Essential Database Security -- Chapter 1: Security for Today's World -- The Security Landscape -- Base Assumptions -- Database Security Today -- Evolving Security Technologies -- Security Motivators -- Sensitive Data Categorization -- Principles -- Summary -- Chapter 2: Essential Elements of User Security -- Understanding Identification and Authentication -- Identification Methods -- Authentication -- Understanding Database Account Types
Database Account Types in Oracle Database 12c Multitenant Architecture -- Privileged Database Account Management in Oracle Database 12c -- Administrative Privileges for Separation of Duty -- Methods for Privileged Database Account Management -- Account Management in Multitenant Oracle Database 12c -- Creating Common Database Accounts -- Managing Accounts in a Pluggable Database -- Managing Database Account Passwords and Profiles -- Managing Passwords for Local Database Accounts -- Managing Database Account Profiles -- Summary -- Chapter 3: Connection Pools and Enterprise Users
External Identification and Authentication Challenges -- Connection Challenges -- Performance -- Connection Pools -- Security Risks -- External Identification and Authentication in Oracle Database 12c -- Oracle Proxy Authentication -- Oracle Enterprise User Security -- Oracle Kerberos Authentication -- Oracle RADIUS Authentication -- Summary -- Chapter 4: Foundational Elements for a Secure Database -- Access Control, Authorization, and Privilege -- Access Control -- Authorization -- Privilege -- Object Privileges -- Column Privileges -- Synonyms -- System and Object Privileges Together
Privilege Conveyance and Retraction -- Roles -- Role and Privilege Immediacy -- Roles and Container Databases -- Public and Default Database Roles -- Role Hierarchies -- Object Privileges Through Roles and PL/SQL -- Selective Privilege Enablement -- Selective Privilege Use Cases -- Password-Protected Roles -- Password-Protected Role Example -- Password-Protected Roles and Proxy Authentication -- Challenges to Securing the Password -- Secure Application Roles -- Secure Application Role Example -- Global Roles and Enterprise Roles -- Creating and Assigning Global and Enterprise Roles
Combining Standard and Global Roles -- Using Roles Wisely -- Too Many Roles -- Naming -- Dependencies -- Summary -- Chapter 5: Foundational Elements of Database Application Security -- Application Context -- Default Application Context (USERENV) -- Auditing with USERENV -- Database Session-Based Application Context -- Creating a Database Session-Based Application Context -- Setting Context Attributes and Values -- Applying the Application Context to Security -- Secure Use -- Common Mistakes -- Global Application Context -- GAC Uses -- GAC Example -- Global Context Memory Usage
Subject Oracle (Computer file)
Oracle (Computer file)
Database security.
Bases de données -- Sécurité -- Mesures.
Database security
Added Author Knox, David (David Christopher), author.
Maroulis, William, author.
Added Title Oracle database twelve c security
Other Form: Print version: Gaetjen, Scott. Oracle database 12c security 9780071824286 (DLC) 2014044429 (OCoLC)875520327
ISBN 9780071822961 (electronic bk.)
0071822968 (electronic bk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information