Flylib.com
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
010 - Main
011 - TOC
012 - Copyright
013 - Dedication
014 - Preface
015 - What This Book Is
016 - What This Book Is Not
017 - Audience for This Book
018 - Conventions Used in This Book
019 - Platforms and Versions of Oracle
020 - Comments and Questions
021 - Acknowledgments
022 - Part I: Security in an oracle System
023 - Chapter 1. Oracle and Security
024 - 1.1 What s It All About?
025 - 1.2 The Oracle Security Model
026 - 1.3 Procedures, Policies, and Plans
027 - 1.4 If I Had a Hammer...
028 - Chapter 2. Oracle System Files
029 - 2.1 What s in the Files?
030 - What the Oracle System Files Really Are
031 - 2.3 Types of Database Files
032 - Chapter 3. Oracle Database Objects
033 - 3.1 The User Interface: User Versus Schema
034 - 3.2 Objects
035 - 3.3 Tables
036 - 3.4 Table Triggers
037 - 3.5 Views
038 - 3.6 Stored Programs
039 - 3.7 Synonyms
040 - 3.8 Privileges
041 - 3.9 Roles
042 - 3.10 Profiles
043 - Chapter 4. The Oracle Data Dictionary
044 - 4.1 Creating and Maintaining the Data Dictionary
045 - 4.2 The Data Dictionary Views
046 - 4.3 About SQL.BSQ
047 - 4.4 Views Used for Security
048 - 4.5 The Composition of the Views
049 - Chapter 5. Oracle Default Roles and User Accounts
050 - 5.1 About the Defaults
051 - 5.2 The CONNECT Role
052 - 5.3 The RESOURCE Role
053 - 5.4 The DBA Role
054 - New Default Roles in Oracle8
055 - 5.6 Using the Default Roles
056 - 5.7 Default User Accounts
057 - 5.8 Segmenting Authority in the Database
058 - Chapter 6. Profiles, Passwords, and Synonyms
059 - 6.1 Profiles
060 - 6.2 Passwords
061 - Tips for Creating Synonyms
062 - Part II: Implementing Security
063 - Chapter 7. Developing a Database Security Plan
064 - 7.1 About the Security Policy and Security Plan
065 - 7.2 Types of Accounts
066 - 7.3 Standards for Accounts
067 - 7.4 Standards for Usernames
068 - 7.5 Standards for Passwords
069 - 7.6 Standards for Roles
070 - 7.7 Standards for Views
071 - 7.8 Standards for the Oracle Security Server
072 - 7.9 Standards for Employees
073 - 7.10 Sample Security Plan Index
074 - 7.11 Sample Security Plan Checklist
075 - Chapter 8. Installing and Starting Oracle
076 - 8.1 Segmenting Application Processing
077 - 8.2 Installing Oracle Securely
078 - 8.3 Connecting to the Database Without a Password
079 - 8.4 Installing and Configuring SQLNet
080 - 8.5 Setting Up Initialization Parameters for Security
081 - Chapter 9. Developing a Simple Security Application
082 - 9.1 The Application Overview
083 - 9.2 Preparing the Role-Object Matrix
084 - 9.3 Views
085 - 9.4 Roles
086 - 9.5 Grants
087 - 9.6 Application Control of Access
088 - Chapter 10. Developing an Audit Plan
089 - 10.1 Why Audit?
090 - 10.2 Where to Audit
091 - 10.3 How Auditing Works
092 - 10.4 Auditing and Performance
093 - 10.5 Default Auditing
094 - 10.6 Types of Auditing
095 - 10.7 Purging Audit Information
096 - Chapter 11. Developing a Sample Audit Application
099 - 11.3 Using the Audit Data in Reports
098 - 11.2 About Performance and Storage
097 - 11.1 About the Audit Trail Application
100 - 11.4 SQL Scripts to Generate Scripts
101 - Chapter 12. Backing Up and Recovering the Database
102 - 12.1 What Are the Backup Options?
103 - 12.2 What s New for Oracle8?
104 - Backup and Recovery Reminders
105 - Chapter 13. Using the Oracle Enterprise Manager
106 - 13.1 What Is the OEM?
107 - 13.2 The DBA Toolkit and Security
108 - 13.3 OEM and the Job Scheduler
109 - 13.4 OEM and the Event Management System
110 - Chapter 14. Maintaining User Accounts
111 - 14.1 Application Design Requirements
112 - 14.2 Running the Application
113 - 14.3 Documenting the User State
114 - A Disclaimer
115 - Part III: Enhanced Oracle Security
116 - Chapter 15. Using the Oracle Security Server
117 - 15.1 About Cryptography
118 - 15.2 Ways to Authenticate Users
119 - 15.3 What s in the OSS?
120 - 15.4 Configuring and Using the OSS
121 - Chapter 16. Using the Internet and the Web
122 - 16.1 Web Basics
123 - 16.2 Evaluating Web Assets and Risks
124 - 16.3 Protecting a Web Site
125 - 16.4 Getting Users Involved
126 - Chapter 17. Using Extra-Cost Options
127 - 17.1 Trusted Oracle
128 - 17.2 Advanced Networking Option
129 - 17.3 Oracle Application Server
130 - Appendix A. References
131 - A.1 Oracle Books
132 - A.2 Security Books
133 - A.3 Oracle Electronic References
134 - A.4 Security Electronic References
135 - Colophon
136 - Index
137 - SYMBOL
138 - A
139 - B
140 - C
141 - D
142 - E
143 - F
144 - G
145 - H
146 - I
147 - J
148 - K
149 - L
150 - M
151 - N
152 - O
153 - P
154 - Q
155 - R
156 - S
157 - T
158 - U
159 - V
160 - W
161 - X
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 21. Track the International Space Station
Hacks 2941: Introduction
Hack 48. Tell Your Communitys Story
Hack 55. Put Photographs on Your Google Maps
Hack 66. Add Your Own Custom Map
An Introduction to Design Patterns in C++ with Qt 4
Conversions
References to const
Review Questions
Statements and Control Structures
Memory Access Summary
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Project Execution
Exam Prep Questions
Exam Prep Questions
Answers and Explanations
Sap Bw: a Step By Step Guide for Bw 2.0
Creating an InfoCube
Part II. Advanced Topics
Business Content
Replicating R/3 DataSources
Creating DataSources in R/3 and Replicating Them to BW
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
The EDIT Command
Executing Scripts
Bind Variables
The Site and User Profiles
Section B.3. Formatting Dates
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Scheduling a Quartz Job Declaratively
Thread Use in Listeners
Quartz Utility Plug-Ins
Testing the RMI Server and Client
Working with Jobs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies