Flylib.com
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
010 - Main
011 - TOC
012 - Copyright
013 - Dedication
014 - Preface
015 - What This Book Is
016 - What This Book Is Not
017 - Audience for This Book
018 - Conventions Used in This Book
019 - Platforms and Versions of Oracle
020 - Comments and Questions
021 - Acknowledgments
022 - Part I: Security in an oracle System
023 - Chapter 1. Oracle and Security
024 - 1.1 What s It All About?
025 - 1.2 The Oracle Security Model
026 - 1.3 Procedures, Policies, and Plans
027 - 1.4 If I Had a Hammer...
028 - Chapter 2. Oracle System Files
029 - 2.1 What s in the Files?
030 - What the Oracle System Files Really Are
031 - 2.3 Types of Database Files
032 - Chapter 3. Oracle Database Objects
033 - 3.1 The User Interface: User Versus Schema
034 - 3.2 Objects
035 - 3.3 Tables
036 - 3.4 Table Triggers
037 - 3.5 Views
038 - 3.6 Stored Programs
039 - 3.7 Synonyms
040 - 3.8 Privileges
041 - 3.9 Roles
042 - 3.10 Profiles
043 - Chapter 4. The Oracle Data Dictionary
044 - 4.1 Creating and Maintaining the Data Dictionary
045 - 4.2 The Data Dictionary Views
046 - 4.3 About SQL.BSQ
047 - 4.4 Views Used for Security
048 - 4.5 The Composition of the Views
049 - Chapter 5. Oracle Default Roles and User Accounts
050 - 5.1 About the Defaults
051 - 5.2 The CONNECT Role
052 - 5.3 The RESOURCE Role
053 - 5.4 The DBA Role
054 - New Default Roles in Oracle8
055 - 5.6 Using the Default Roles
056 - 5.7 Default User Accounts
057 - 5.8 Segmenting Authority in the Database
058 - Chapter 6. Profiles, Passwords, and Synonyms
059 - 6.1 Profiles
060 - 6.2 Passwords
061 - Tips for Creating Synonyms
062 - Part II: Implementing Security
063 - Chapter 7. Developing a Database Security Plan
064 - 7.1 About the Security Policy and Security Plan
065 - 7.2 Types of Accounts
066 - 7.3 Standards for Accounts
067 - 7.4 Standards for Usernames
068 - 7.5 Standards for Passwords
069 - 7.6 Standards for Roles
070 - 7.7 Standards for Views
071 - 7.8 Standards for the Oracle Security Server
072 - 7.9 Standards for Employees
073 - 7.10 Sample Security Plan Index
074 - 7.11 Sample Security Plan Checklist
075 - Chapter 8. Installing and Starting Oracle
076 - 8.1 Segmenting Application Processing
077 - 8.2 Installing Oracle Securely
078 - 8.3 Connecting to the Database Without a Password
079 - 8.4 Installing and Configuring SQLNet
080 - 8.5 Setting Up Initialization Parameters for Security
081 - Chapter 9. Developing a Simple Security Application
082 - 9.1 The Application Overview
083 - 9.2 Preparing the Role-Object Matrix
084 - 9.3 Views
085 - 9.4 Roles
086 - 9.5 Grants
087 - 9.6 Application Control of Access
088 - Chapter 10. Developing an Audit Plan
089 - 10.1 Why Audit?
090 - 10.2 Where to Audit
091 - 10.3 How Auditing Works
092 - 10.4 Auditing and Performance
093 - 10.5 Default Auditing
094 - 10.6 Types of Auditing
095 - 10.7 Purging Audit Information
096 - Chapter 11. Developing a Sample Audit Application
099 - 11.3 Using the Audit Data in Reports
098 - 11.2 About Performance and Storage
097 - 11.1 About the Audit Trail Application
100 - 11.4 SQL Scripts to Generate Scripts
101 - Chapter 12. Backing Up and Recovering the Database
102 - 12.1 What Are the Backup Options?
103 - 12.2 What s New for Oracle8?
104 - Backup and Recovery Reminders
105 - Chapter 13. Using the Oracle Enterprise Manager
106 - 13.1 What Is the OEM?
107 - 13.2 The DBA Toolkit and Security
108 - 13.3 OEM and the Job Scheduler
109 - 13.4 OEM and the Event Management System
110 - Chapter 14. Maintaining User Accounts
111 - 14.1 Application Design Requirements
112 - 14.2 Running the Application
113 - 14.3 Documenting the User State
114 - A Disclaimer
115 - Part III: Enhanced Oracle Security
116 - Chapter 15. Using the Oracle Security Server
117 - 15.1 About Cryptography
118 - 15.2 Ways to Authenticate Users
119 - 15.3 What s in the OSS?
120 - 15.4 Configuring and Using the OSS
121 - Chapter 16. Using the Internet and the Web
122 - 16.1 Web Basics
123 - 16.2 Evaluating Web Assets and Risks
124 - 16.3 Protecting a Web Site
125 - 16.4 Getting Users Involved
126 - Chapter 17. Using Extra-Cost Options
127 - 17.1 Trusted Oracle
128 - 17.2 Advanced Networking Option
129 - 17.3 Oracle Application Server
130 - Appendix A. References
131 - A.1 Oracle Books
132 - A.2 Security Books
133 - A.3 Oracle Electronic References
134 - A.4 Security Electronic References
135 - Colophon
136 - Index
137 - SYMBOL
138 - A
139 - B
140 - C
141 - D
142 - E
143 - F
144 - G
145 - H
146 - I
147 - J
148 - K
149 - L
150 - M
151 - N
152 - O
153 - P
154 - Q
155 - R
156 - S
157 - T
158 - U
159 - V
160 - W
161 - X
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Asymmetric Key Cryptography
CMS and S/MIME
SSL and TLS
Appendix A Solutions to Exercises
CISSP Exam Cram 2
How to Prepare for the Exam
Building Defense in Depth
Implementation
Major Legal Systems
History of Encryption
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Presenting InfoPath 2003 SP-1
Laying Out Forms
Adding Views to a Template
Connecting Forms to Databases
Navigating the InfoPath Object Model
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Basics
Internet Protocol (IP) Addressing
Internet Protocol (IP) Routing
Internet Group Management Protocol (IGMP)
Transmission Control Protocol (TCP) Data Flow
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Analog and Digital Transmission
Establishing Connections: Networking Modes and Switching Modes
The OSI Reference Model and the TCP/IP Reference Model
LAN Interconnection and Internetworking
HANs
Digital Character Animation 3 (No. 3)
Chapter Three. Rigging Characters
Animation Interfaces
Animating Walks
Animating Dialogue
Acting Technique
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies