Flylib.com
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
010 - Main
011 - TOC
012 - Copyright
013 - Dedication
014 - Preface
015 - What This Book Is
016 - What This Book Is Not
017 - Audience for This Book
018 - Conventions Used in This Book
019 - Platforms and Versions of Oracle
020 - Comments and Questions
021 - Acknowledgments
022 - Part I: Security in an oracle System
023 - Chapter 1. Oracle and Security
024 - 1.1 What s It All About?
025 - 1.2 The Oracle Security Model
026 - 1.3 Procedures, Policies, and Plans
027 - 1.4 If I Had a Hammer...
028 - Chapter 2. Oracle System Files
029 - 2.1 What s in the Files?
030 - What the Oracle System Files Really Are
031 - 2.3 Types of Database Files
032 - Chapter 3. Oracle Database Objects
033 - 3.1 The User Interface: User Versus Schema
034 - 3.2 Objects
035 - 3.3 Tables
036 - 3.4 Table Triggers
037 - 3.5 Views
038 - 3.6 Stored Programs
039 - 3.7 Synonyms
040 - 3.8 Privileges
041 - 3.9 Roles
042 - 3.10 Profiles
043 - Chapter 4. The Oracle Data Dictionary
044 - 4.1 Creating and Maintaining the Data Dictionary
045 - 4.2 The Data Dictionary Views
046 - 4.3 About SQL.BSQ
047 - 4.4 Views Used for Security
048 - 4.5 The Composition of the Views
049 - Chapter 5. Oracle Default Roles and User Accounts
050 - 5.1 About the Defaults
051 - 5.2 The CONNECT Role
052 - 5.3 The RESOURCE Role
053 - 5.4 The DBA Role
054 - New Default Roles in Oracle8
055 - 5.6 Using the Default Roles
056 - 5.7 Default User Accounts
057 - 5.8 Segmenting Authority in the Database
058 - Chapter 6. Profiles, Passwords, and Synonyms
059 - 6.1 Profiles
060 - 6.2 Passwords
061 - Tips for Creating Synonyms
062 - Part II: Implementing Security
063 - Chapter 7. Developing a Database Security Plan
064 - 7.1 About the Security Policy and Security Plan
065 - 7.2 Types of Accounts
066 - 7.3 Standards for Accounts
067 - 7.4 Standards for Usernames
068 - 7.5 Standards for Passwords
069 - 7.6 Standards for Roles
070 - 7.7 Standards for Views
071 - 7.8 Standards for the Oracle Security Server
072 - 7.9 Standards for Employees
073 - 7.10 Sample Security Plan Index
074 - 7.11 Sample Security Plan Checklist
075 - Chapter 8. Installing and Starting Oracle
076 - 8.1 Segmenting Application Processing
077 - 8.2 Installing Oracle Securely
078 - 8.3 Connecting to the Database Without a Password
079 - 8.4 Installing and Configuring SQLNet
080 - 8.5 Setting Up Initialization Parameters for Security
081 - Chapter 9. Developing a Simple Security Application
082 - 9.1 The Application Overview
083 - 9.2 Preparing the Role-Object Matrix
084 - 9.3 Views
085 - 9.4 Roles
086 - 9.5 Grants
087 - 9.6 Application Control of Access
088 - Chapter 10. Developing an Audit Plan
089 - 10.1 Why Audit?
090 - 10.2 Where to Audit
091 - 10.3 How Auditing Works
092 - 10.4 Auditing and Performance
093 - 10.5 Default Auditing
094 - 10.6 Types of Auditing
095 - 10.7 Purging Audit Information
096 - Chapter 11. Developing a Sample Audit Application
099 - 11.3 Using the Audit Data in Reports
098 - 11.2 About Performance and Storage
097 - 11.1 About the Audit Trail Application
100 - 11.4 SQL Scripts to Generate Scripts
101 - Chapter 12. Backing Up and Recovering the Database
102 - 12.1 What Are the Backup Options?
103 - 12.2 What s New for Oracle8?
104 - Backup and Recovery Reminders
105 - Chapter 13. Using the Oracle Enterprise Manager
106 - 13.1 What Is the OEM?
107 - 13.2 The DBA Toolkit and Security
108 - 13.3 OEM and the Job Scheduler
109 - 13.4 OEM and the Event Management System
110 - Chapter 14. Maintaining User Accounts
111 - 14.1 Application Design Requirements
112 - 14.2 Running the Application
113 - 14.3 Documenting the User State
114 - A Disclaimer
115 - Part III: Enhanced Oracle Security
116 - Chapter 15. Using the Oracle Security Server
117 - 15.1 About Cryptography
118 - 15.2 Ways to Authenticate Users
119 - 15.3 What s in the OSS?
120 - 15.4 Configuring and Using the OSS
121 - Chapter 16. Using the Internet and the Web
122 - 16.1 Web Basics
123 - 16.2 Evaluating Web Assets and Risks
124 - 16.3 Protecting a Web Site
125 - 16.4 Getting Users Involved
126 - Chapter 17. Using Extra-Cost Options
127 - 17.1 Trusted Oracle
128 - 17.2 Advanced Networking Option
129 - 17.3 Oracle Application Server
130 - Appendix A. References
131 - A.1 Oracle Books
132 - A.2 Security Books
133 - A.3 Oracle Electronic References
134 - A.4 Security Electronic References
135 - Colophon
136 - Index
137 - SYMBOL
138 - A
139 - B
140 - C
141 - D
142 - E
143 - F
144 - G
145 - H
146 - I
147 - J
148 - K
149 - L
150 - M
151 - N
152 - O
153 - P
154 - Q
155 - R
156 - S
157 - T
158 - U
159 - V
160 - W
161 - X
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Creating a Process
Creating and Accessing Semaphore Sets
Using a File as Shared Memory
Key Terms and Concepts
Executing Remote Commands in a Program
Building Web Applications with UML (2nd Edition)
Beyond HTTP and HTML
Architecture Elaboration
Discussion
Vision
Analysis Model Collaborations
A Practitioners Guide to Software Test Design
Section I - Black Box Testing Techniques
Domain Analysis Testing
Control Flow Testing
Section IV - Supporting Technologies
Defect Taxonomies
MySQL Cookbook
Using Copy and Paste as a mysql Input Source
Mapping NULL Values to Other Values for Display
Writing Applications That Adapt to the MySQL Server Version
Performing Transactions Using SQL
Using MySQL-Based Storage with the PHP Session Manager
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 31. Analyze Traffic with Ethereal
Hack 66. Filter MAC with HostAP and Madwifi
Hack 71. Wall Off Your Wireless
Hack 88. Primestar Dish with Biquad Feed
Section B.3. Antenna Guide
.NET System Management Services
Using the System.Management Namespace
Querying WMI
Handling WMI Events
The WMI Schema
WMI Providers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies