Applied Oracle Security: Developing Secure Database and Middleware Environments: Developing Secure Database and Middleware Environments [NOOK Book]

Overview

Written by leading Oracle security experts, this Oracle Press guide shows you how to develop security applications for the Oracle environment. Applied Oracle Security explains how to maximize the security capabilities in Oracle Database, Oracle Database Vault, Oracle Identify Management, Oracle Application Express, and Oracle Business Intelligence Suite. Protect your data and...
See more details below
Applied Oracle Security: Developing Secure Database and Middleware Environments: Developing Secure Database and Middleware Environments

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$59.99
BN.com price

Overview

Written by leading Oracle security experts, this Oracle Press guide shows you how to develop security applications for the Oracle environment. Applied Oracle Security explains how to maximize the security capabilities in Oracle Database, Oracle Database Vault, Oracle Identify Management, Oracle Application Express, and Oracle Business Intelligence Suite. Protect your data and applications by using the proven strategies inside this authoritative resource.


  • Use Oracle Transparent Data Encryption to protect sensitive information

  • Deploy Oracle Audit Vault to build a coherent enterprise audit strategy

  • Fortify your Oracle Databases with best practices from the creators of Oracle Database Vault

  • Apply Oracle Database Vault security controls to new and existing applications

  • Develop a foundation for identity management architecture using a simple and practical methodology

  • Apply Oracle Identity Manager to automate user provisioning processes

  • Create next generation user directories with Oracle Internet Directory and Oracle Virtual Directory

  • Build secure applications leveraging database security with Oracle Application Express

  • Integrate Oracle Business Intelligence Enterprise Edition and identity management solutions to control user access to data and functionality
Read More Show Less

Product Details

  • ISBN-13: 9780071613712
  • Publisher: McGraw-Hill Education
  • Publication date: 10/19/2009
  • Series: Oracle Press
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 640
  • Sales rank: 921270
  • File size: 9 MB

Meet the Author

David C. Knox is the senior director of the Solution Engineering division for Oracle North American Sales and Consulting.

Scott G. Gaetjen is a technical director in Oracle's National Security Group (NSG).

Hamza Jahangir has been a principal security specialist at Oracle as since 2004.

Tyler Muth is a solution architect with Oracle Public Sector specializing in database and application security.

Patrick Sack, chief technologist and technical vice president, runs the Product Engineering division for Oracle's National Security Group.

Richard Wark, CISSP, is a principal technologist in Oracle's Technology Business Unit.

Bryan Wise is a business intelligence solution specialist for Oracle's Public Sector division.

Read More Show Less

Table of Contents

Part I: Oracle Database Security New Features; Chapter 1. Security Blueprints and New Thinking; Chapter 2. Transparent Data Encryption; Chapter 3. Applied Auditing and Audit Vault; Part II: Oracle Database Vault; Chapter 4. Database Vault Introduction; Chapter 5. Database Vault Fundamentals; Chapter 6. Applied Database Vault for Custom Applications; Chapter 7. Applied Database Vault for Existing Applications; Part III: Identity Management; Chapter 8. Architecting Identity Management; Chapter 9. Oracle Identity Manager; Chapter 10. Oracle Directory Services; Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence; Chapter 11. Web-centric Security in APEX; Chapter 12. Secure Coding Practices in APEX; Chapter 13. Securing Access to Oracle BI; Chapter 14. Securing Oracle BI Content and Data; Appendix A. Using the Oracle BI Examples; Index
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)