With an emphasis on real-world problems and detailed solutions, this comprehensive text provides all the information you need to develop and deploy secure database applications, covering the entire security cycle.
Table of Contents
Effective Oracle Database 10g Security by Design
Foreword
Introduction
Part I - Quick Start
Chapter 1
-
General Security Best Practices
Chapter 2
-
Securing The Database
Part II - Identification and Authentication
Chapter 3
-
Understanding Identification and Authentication
Chapter 4
-
Connection Pools and Proxy Authentication
Chapter 5
-
Identity Management and Enterprise Users
Chapter 6
-
Identification and Authentication for Web Applications
Part III - Authorizations and Auditing
Chapter 7
-
Privileges and Roles
Chapter 8
-
Effective Auditing for Accountability
Part IV - Fine-Grained Access Control
Chapter 9
-
Application Contexts For Security And Performance
Chapter 10
-
Implementing Fine-Grained Access Controls with Views