Flylib.com
Effective Oracle Database 10g Security by Design
Effective Oracle Database 10g Security by Design
ISBN: 0072231300
EAN: 2147483647
Year: 2003
Pages: 111
Authors:
David Knox
,
McGraw-Hill
BUY ON AMAZON
Effective Oracle Database 10g Security by Design
Table of Contents
Foreword
Introduction
Part I: Quick Start
Chapter 1: General Security Best Practices
Security Policies
The Tenets of Security
Risk Analysis
Snapshots and Situational Awareness
Hardening the Infrastructure
Summary
Chapter 2: Securing The Database
Securing (Default) User Accounts
Oracle Passwords
Limiting Database Resources
Default Roles
PUBLIC Privileges
Securing the Network
Summary
Part II: Identification and Authentication
Chapter 3: Understanding Identification and Authentication
Importance of Identification and Authentication
Identification Methods
Identity Crisis
Authentication
Single Sign-On
Database IA
Summary
Chapter 4: Connection Pools and Proxy Authentication
Heritage
Web Applications
Connection Pools
Session Pools and the Oracle OCI Connection Pool
Proxy Authentication
Summary
Chapter 5: Identity Management and Enterprise Users
Identity Management
Enterprise Users
Setting Up EUS
Applying EUS
User-Schema Mappings
Considerations
Summary
Chapter 6: Identification and Authentication for Web Applications
Integrated Authentication
Proxy Authentication Alternatives
Identifying Information
Summary
Part III: Authorizations and Auditing
Chapter 7: Privileges and Roles
Privileges
Roles
Selective Privilege Enablement
Password-Protected Roles
Secure Application Roles
Global Roles and Enterprise Roles
Using Roles Wisely
ExamplePutting the Pieces Together
Summary
Chapter 8: Effective Auditing for Accountability
The Security Cycle
Audit Methods
Data Versioning
Standard Database Auditing
Fine-Grained Auditing
Summary
Part IV: Fine-Grained Access Control
Chapter 9: Application Contexts For Security And Performance
Application Context
Default USERENV Context
Local Context
Global Context
External and Initialized Globally
Summary
Chapter 10: Implementing Fine-Grained Access Controls with Views
Introduction to Fine-Grained Access
Secure Views
Summary
Chapter 11: Row-Level Security with Virtual Private Database
The Need for Virtual Private Databases
Row-Level Security Quick Start
RLS In-Depth
Column Sensitive VPD
VPD Performance
Summary
Chapter 12: Oracle Label Security
OLS Ancestry
Oracle Label Security
Label Example
Label Components
Hiding the Label
Writing to OLS Protected Tables
Tips and Tricks
OLS Consideration Factors
VPD Versus Label Security
Summary
Chapter 13: Database Encryption
When to Use Database Encryption
DBMS_CRYPTO
Encryption Examples
Encryption In-Depth
Hashing
Performance
Key Management
Summary
Part V: Appendixes
Appendix A: Setting Up the Security Manager
Appendix B: DATA_CRYPTO Package
Appendix C: DBMS_CRYPTO Performance Test Results
Effective Oracle Database 10g Security by Design
ISBN: 0072231300
EAN: 2147483647
Year: 2003
Pages: 111
Authors:
David Knox
,
McGraw-Hill
BUY ON AMAZON
Similar book on Amazon
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Applied Oracle Security: Developing Secure Database and Middleware Environments
Introduction to Computer Security
Computer Security: Art and Science
The Data Warehouse Lifecycle Toolkit
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
CISSP Exam Cram 2
A Note from Series Editor Ed Tittel
Exam Prep Questions
Business Continuity Planning
Parameters of Investigation
Forensics
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 16. How Big Is the World?
Hack 17. Map the News
Hack 35. Load Driving Directions into Your GPS
Hack 48. Tell Your Communitys Story
Hack 50. Geoblog with Google Maps in Thingster
Information Dashboard Design: The Effective Visual Communication of Data
Choosing Inappropriate Display Media
Introducing Meaningless Variety
Characteristics of a Well-Designed Dashboard
Putting It All Together
Sample Marketing Analysis Dashboard
Junos Cookbook (Cookbooks (OReilly))
Including Comments in the Configuration
Debugging a Failed Commit
Gathering Software Version Information
Creating Static Routes
Creating a Not-So-Stubby Area
.NET-A Complete Development Cycle
Implementation of Regions, Pens, and Brushes
Analysis of the Image Postprocessing Requirements
Adding 3D Text to the Photo Editor Application
Breakdown of the Code Modules
Security and Database Access
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Configuring a DataSource for JobStoreTX
Implementing Quartz Listeners
Quartz Clustering Cookbook
Working with the Scheduler
Using Quartz with Workflow
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies