Flylib.com
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
010 - Main
011 - TOC
012 - Copyright
013 - Dedication
014 - Preface
015 - What This Book Is
016 - What This Book Is Not
017 - Audience for This Book
018 - Conventions Used in This Book
019 - Platforms and Versions of Oracle
020 - Comments and Questions
021 - Acknowledgments
022 - Part I: Security in an oracle System
023 - Chapter 1. Oracle and Security
024 - 1.1 What s It All About?
025 - 1.2 The Oracle Security Model
026 - 1.3 Procedures, Policies, and Plans
027 - 1.4 If I Had a Hammer...
028 - Chapter 2. Oracle System Files
029 - 2.1 What s in the Files?
030 - What the Oracle System Files Really Are
031 - 2.3 Types of Database Files
032 - Chapter 3. Oracle Database Objects
033 - 3.1 The User Interface: User Versus Schema
034 - 3.2 Objects
035 - 3.3 Tables
036 - 3.4 Table Triggers
037 - 3.5 Views
038 - 3.6 Stored Programs
039 - 3.7 Synonyms
040 - 3.8 Privileges
041 - 3.9 Roles
042 - 3.10 Profiles
043 - Chapter 4. The Oracle Data Dictionary
044 - 4.1 Creating and Maintaining the Data Dictionary
045 - 4.2 The Data Dictionary Views
046 - 4.3 About SQL.BSQ
047 - 4.4 Views Used for Security
048 - 4.5 The Composition of the Views
049 - Chapter 5. Oracle Default Roles and User Accounts
050 - 5.1 About the Defaults
051 - 5.2 The CONNECT Role
052 - 5.3 The RESOURCE Role
053 - 5.4 The DBA Role
054 - New Default Roles in Oracle8
055 - 5.6 Using the Default Roles
056 - 5.7 Default User Accounts
057 - 5.8 Segmenting Authority in the Database
058 - Chapter 6. Profiles, Passwords, and Synonyms
059 - 6.1 Profiles
060 - 6.2 Passwords
061 - Tips for Creating Synonyms
062 - Part II: Implementing Security
063 - Chapter 7. Developing a Database Security Plan
064 - 7.1 About the Security Policy and Security Plan
065 - 7.2 Types of Accounts
066 - 7.3 Standards for Accounts
067 - 7.4 Standards for Usernames
068 - 7.5 Standards for Passwords
069 - 7.6 Standards for Roles
070 - 7.7 Standards for Views
071 - 7.8 Standards for the Oracle Security Server
072 - 7.9 Standards for Employees
073 - 7.10 Sample Security Plan Index
074 - 7.11 Sample Security Plan Checklist
075 - Chapter 8. Installing and Starting Oracle
076 - 8.1 Segmenting Application Processing
077 - 8.2 Installing Oracle Securely
078 - 8.3 Connecting to the Database Without a Password
079 - 8.4 Installing and Configuring SQLNet
080 - 8.5 Setting Up Initialization Parameters for Security
081 - Chapter 9. Developing a Simple Security Application
082 - 9.1 The Application Overview
083 - 9.2 Preparing the Role-Object Matrix
084 - 9.3 Views
085 - 9.4 Roles
086 - 9.5 Grants
087 - 9.6 Application Control of Access
088 - Chapter 10. Developing an Audit Plan
089 - 10.1 Why Audit?
090 - 10.2 Where to Audit
091 - 10.3 How Auditing Works
092 - 10.4 Auditing and Performance
093 - 10.5 Default Auditing
094 - 10.6 Types of Auditing
095 - 10.7 Purging Audit Information
096 - Chapter 11. Developing a Sample Audit Application
099 - 11.3 Using the Audit Data in Reports
098 - 11.2 About Performance and Storage
097 - 11.1 About the Audit Trail Application
100 - 11.4 SQL Scripts to Generate Scripts
101 - Chapter 12. Backing Up and Recovering the Database
102 - 12.1 What Are the Backup Options?
103 - 12.2 What s New for Oracle8?
104 - Backup and Recovery Reminders
105 - Chapter 13. Using the Oracle Enterprise Manager
106 - 13.1 What Is the OEM?
107 - 13.2 The DBA Toolkit and Security
108 - 13.3 OEM and the Job Scheduler
109 - 13.4 OEM and the Event Management System
110 - Chapter 14. Maintaining User Accounts
111 - 14.1 Application Design Requirements
112 - 14.2 Running the Application
113 - 14.3 Documenting the User State
114 - A Disclaimer
115 - Part III: Enhanced Oracle Security
116 - Chapter 15. Using the Oracle Security Server
117 - 15.1 About Cryptography
118 - 15.2 Ways to Authenticate Users
119 - 15.3 What s in the OSS?
120 - 15.4 Configuring and Using the OSS
121 - Chapter 16. Using the Internet and the Web
122 - 16.1 Web Basics
123 - 16.2 Evaluating Web Assets and Risks
124 - 16.3 Protecting a Web Site
125 - 16.4 Getting Users Involved
126 - Chapter 17. Using Extra-Cost Options
127 - 17.1 Trusted Oracle
128 - 17.2 Advanced Networking Option
129 - 17.3 Oracle Application Server
130 - Appendix A. References
131 - A.1 Oracle Books
132 - A.2 Security Books
133 - A.3 Oracle Electronic References
134 - A.4 Security Electronic References
135 - Colophon
136 - Index
137 - SYMBOL
138 - A
139 - B
140 - C
141 - D
142 - E
143 - F
144 - G
145 - H
146 - I
147 - J
148 - K
149 - L
150 - M
151 - N
152 - O
153 - P
154 - Q
155 - R
156 - S
157 - T
158 - U
159 - V
160 - W
161 - X
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Environment Variables
Locking Files
Introduction
Shared Memory Operations
C.2. RPC Definitions
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 5 Printers
Domain 6 Basic Networking
Domain 1 Operating System Fundamentals
Domain 2 Installation, Configuration, and Upgrading
Java for RPG Programmers, 2nd Edition
The World Of Java
Javas Language And Syntax
Data Types And Variables
User Interface
More Java
SQL Hacks
Hack 47. Exploit an SQL Injection Vulnerability
Hack 60. Create a List of Personalized Parameters
Hack 84. Store Comma-Delimited Lists in a Column
Hack 88. Test Two Values from a Subquery
Users and Administration
An Introduction to Design Patterns in C++ with Qt 4
Friends of a Class
Introduction to Containers
Type Identification and qobject_cast
Creational Patterns
Tree Models
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #1 Lockheed Martin Creating a New Legacy
Phase 2 Engagement (Creating Pull)
Phase 3 Mobilization
Phase 4 Performance and Control
Service Process Challenges
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies