Oracle Database 12c Security
Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.

  • Connect users to databases in a secure manner
  • Manage identity, authentication, and access control
  • Implement database application security
  • Provide security policies across enterprise applications using Real Application Security
  • Control data access with OracleVirtual Private Database
  • Control sensitive data using data redaction and transparent sensitive data protection
  • Control data access with Oracle Label Security
  • Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
  • Implement auditing technologies, including Unified Audit Trail
  • Manage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control
1132740469
Oracle Database 12c Security
Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.

  • Connect users to databases in a secure manner
  • Manage identity, authentication, and access control
  • Implement database application security
  • Provide security policies across enterprise applications using Real Application Security
  • Control data access with OracleVirtual Private Database
  • Control sensitive data using data redaction and transparent sensitive data protection
  • Control data access with Oracle Label Security
  • Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
  • Implement auditing technologies, including Unified Audit Trail
  • Manage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control
76.5 In Stock
Oracle Database 12c Security

Oracle Database 12c Security

Oracle Database 12c Security

Oracle Database 12c Security

eBook

$76.50 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.

  • Connect users to databases in a secure manner
  • Manage identity, authentication, and access control
  • Implement database application security
  • Provide security policies across enterprise applications using Real Application Security
  • Control data access with OracleVirtual Private Database
  • Control sensitive data using data redaction and transparent sensitive data protection
  • Control data access with Oracle Label Security
  • Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
  • Implement auditing technologies, including Unified Audit Trail
  • Manage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control

Product Details

ISBN-13: 9780071822961
Publisher: McGraw Hill LLC
Publication date: 01/09/2015
Sold by: Barnes & Noble
Format: eBook
Pages: 552
File size: 74 MB
Note: This product may take a few minutes to download.

About the Author

David Knox (Chantilly, VA), one of the top Oracle security experts working today, is technology vice president in Oracle’s National Security Group which focuses on the US Intelligence Community (USIC).

William Maroulis (Brambleton, VA) is a Senior Technical Director with Oracle’s National Security Group.

Scott Gaetjen (Plano, TX) conducts research and design on new security solutions, leveraging his 20+ years of experience with Oracle-based technologies to provide advanced security capabilities to Oracle’s customers.

Table of Contents

1) Database Vault for privileged users/objects/commands 2) Separation of Duties3) Virtual Private Database for row/column/cell security4) Label based access control5) Secure Application Context 6) Sensitive data discovery7) Least privilege analysis8) Multi-factor auditing and redaction9) Real Application Security10) Code-based access control (CBAC) associates privileges with code11) Transparent Sensitive Data Protection associates policies with sensitive columns
From the B&N Reads Blog

Customer Reviews