Effective Oracle Database 10g Security by Design / Edition 1

Effective Oracle Database 10g Security by Design / Edition 1

ISBN-10:
0072231300
ISBN-13:
9780072231304
Pub. Date:
05/31/2004
Publisher:
McGraw Hill LLC
ISBN-10:
0072231300
ISBN-13:
9780072231304
Pub. Date:
05/31/2004
Publisher:
McGraw Hill LLC
Effective Oracle Database 10g Security by Design / Edition 1

Effective Oracle Database 10g Security by Design / Edition 1

$84.0
Current price is , Original price is $84.0. You
$84.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider

Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Designprovides all the information you need to develop and deploy secure database applications. The entire security cycle is covered—from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.

  • Assess database vulnerabilities and develop effective security policies
  • Preserve user identity with in-depth analyses of JDBC connection pools, proxy authentication, and client identifiers
  • Manage database users from a central directory without sacrificing security
  • Lock down database access using secure application roles
  • Leverage application and database security within Oracle’s Identity Management infrastructure
  • Validate user privileges by using simple views and scripts
  • Protect individual data elements by using the new Oracle DBMS_CRYPTO package
  • Exploit database views to provide row-level and column-level fine-grained access controls
  • Enforce need-to-know access and data privacy with Virtual Private Database and Oracle Label Security
  • Ensure user accountability with Oracle fine-grained Auditing




Product Details

ISBN-13: 9780072231304
Publisher: McGraw Hill LLC
Publication date: 05/31/2004
Series: Oracle Press
Pages: 544
Product dimensions: 7.30(w) x 9.10(h) x 1.14(d)

About the Author

David Knox (Chantilly, VA) is the Chief Engineer for Oracle's Information Assurance Center – Oracle Corporation's Security Center of Excellence. Mr. Knox joined Oracle Corporation in June 1995. While at Oracle, Mr. Knox has worked on many security programs for the US Department of Defense, various Intelligence Agencies, Healthcare and Financial Services industries. His knowledge in computer security derives not only from working knowledge and experience with Oracle's security products and database security, but also his academic studies in the areas of multilevel security, cryptography, LDAP, and PKI. David earned a bachelor's degree in Computer Science from the University of Maryland and a master's degree in Computer Science from Johns Hopkins University.

Table of Contents

PART I Quick Start

1 General Security Best Practices

2 Securing the Database
PART II Identification and Authentication

3 Understanding Identification and Authentication

4 Connection Pools and Proxy Authentication

5 Identity Management and Enterprise Users

6 Identification and Authentication for Web Applications
PART III Authorizations and Auditing

7 Privileges and Roles

8 Effective Auditing for Accountability
PART IV Fine-Grained Access Control

9 Application Contexts for Security and Performance

10 Implementing Fine-Grained Access Controls with Views

11 Row-Level Security with Virtual Private Database

12 Oracle Label Security

13 Database Encryption
PART V Appendixes

A Setting Up the Security Manager

B DATA_CRYPTO Package

C DBMS_CRYPTO Performance Test Results
From the B&N Reads Blog

Customer Reviews