Effective Oracle Database 10g Security by Design [NOOK Book]

Overview

Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider



Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Design provides all the information you need to develop and deploy secure database applications. The ...

See more details below
Effective Oracle Database 10g Security by Design

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$62.99
BN.com price

Overview

Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider



Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Design provides all the information you need to develop and deploy secure database applications. The entire security cycle is covered--from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.





  • Assess database vulnerabilities and develop effective security policies

  • Preserve user identity with in-depth analyses of JDBC connection pools, proxy authentication, and client identifiers

  • Manage database users from a central directory without sacrificing security

  • Lock down database access using secure application roles

  • Leverage application and database security within Oracle’s Identity Management infrastructure

  • Validate user privileges by using simple views and scripts

  • Protect individual data elements by using the new Oracle DBMS_CRYPTO package

  • Exploit database views to provide row-level and column-level fine-grained access controls

  • Enforce need-to-know access and data privacy with Virtual Private Database and Oracle Label Security

  • Ensure user accountability with Oracle fine-grained Auditing



David Knox is the chief engineer for Oracle’s Information Assurance Center and is one of the premier educators worldwide on Oracle security. While at Oracle he has worked on wide-ranging security programs for various customers including the U.S. Department of Defense, intelligence agencies, financial services companies, and healthcare organizations.

Read More Show Less

Product Details

  • ISBN-13: 9780071770460
  • Publisher: McGraw-Hill Education
  • Publication date: 7/8/2004
  • Series: Oracle Press
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 544
  • File size: 8 MB

Meet the Author

David Knox (Chantilly, VA) is the Chief Engineer for Oracle’s Information Assurance Center – Oracle Corporation’s Security Center of Excellence. Mr. Knox joined Oracle Corporation in June 1995. While at Oracle, Mr. Knox has worked on many security programs for the US Department of Defense, various Intelligence Agencies, Healthcare and Financial Services industries. His knowledge in computer security derives not only from working knowledge and experience with Oracle's security products and database security, but also his academic studies in the areas of multilevel security, cryptography, LDAP, and PKI. David earned a bachelor’s degree in Computer Science from the University of Maryland and a master’s degree in Computer Science from Johns Hopkins University.
Read More Show Less

Table of Contents

PART I Quick Start 1 General Security Best Practices 2 Securing the Database PART II Identification and Authentication 3 Understanding Identification and Authentication 4 Connection Pools and Proxy Authentication 5 Identity Management and Enterprise Users 6 Identification and Authentication for Web Applications PART III Authorizations and Auditing 7 Privileges and Roles 8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)