Oracle Security

Overview

Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases.Oracle security has many facets:

  • Establishing an organization's security policy ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (13) from $1.99   
  • New (2) from $45.0   
  • Used (11) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$45.00
Seller since Tue Oct 07 09:37:03 EDT 2014

Feedback rating:

(184)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$52.70
Seller since Sat Jan 01 01:01:01 EST 2005

Feedback rating:

(156)

Condition: New
1998 Trade paperback Illustrated. New. No dust jacket as issued. Excellent New Softcover. Book is from Bookstore Inventory: Book might have a Remainder mark, Minor Edge wear or ... Hint of Page edge soiling. Book has been Displayed. 05.09.08 Trade paperback (US). Glued binding. 443 p. Contains: Illustrations. Audience: General/trade. Read more Show Less

Ships from: Evans, GA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases.Oracle security has many facets:

  • Establishing an organization's security policy and plan
  • Protecting system files and passwords
  • Controlling access to database objects (tables, views, rows, columns, etc.)
  • Building appropriate user profiles, roles, and privileges
  • Monitoring system access via audit trails
Oracle Security describes how these basic database security features are implemented and provides many practical strategies for securing Oracle systems and databases. It explains how to use the Oracle Enterprise Manager and Oracle Security Server to enhance your site's security, and it touches on such advanced security features as encryption, Trusted Oracle, and various Internet and World Wide Web protection strategies.A table of contents follows:Preface Part I: Security in an Oracle System
  • Oracle and Security
  • Oracle System Files
  • Oracle Database Objects
  • The Oracle Data Dictionary
  • Default Roles and User Accounts
  • Profiles, Passwords, and Synonyms
Part II: Implementing Security
  • Developing a Database Security Plan
  • Installing and Starting Oracle
  • Developing a Simple Security Application
  • Developing an Audit Plan
  • Developing a Sample Audit Application
  • Backing Up and Recovering a Database
  • Using the Oracle Enterprise Manager
  • Maintaining User Accounts
Part III: Enhanced Oracle Security
  • Using the Oracle Security Server
  • Using the Internet and the Web
  • Using Extra-Cost Options
Appendix A. References
Read More Show Less

Product Details

  • ISBN-13: 9781565924505
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 10/28/1998
  • Edition number: 1
  • Pages: 456
  • Product dimensions: 7.05 (w) x 9.17 (h) x 0.93 (d)

Meet the Author

William Heney started working with version 2 of the Oracle database in 1980. After doing application development in FORTRAN and what then passed for "Forms," he began to specialize in DBA work. In the ensuing years he has worked for a wide variety of customers, many of whom wanted some form of access control implemented in the database. Some of the techniques acquired during these experiences are reflected in this book.

Marlene Theriault has over 14 years of experience as a database administrator, starting with version 2.0 of the Oracle RDBMS. She has presented papers at numerous conferences throughout the world, including various IOUG-A, DECUS, EOUG, and Oracle OpenWorld conferences. At the 1997 East Coast Oracle conference, Marlene tied for first place with Steven Feuerstein, receiving an "Outstanding Speaker" award. She also received the "Distinguished Speaker" award two years in a row at ECO-'95 and ECO-'96. Marlene's articles have appeared in Pinnacle Press' Oracle Developer magazine, IOUG-A's SELECT magazine, and many user group publications. Marlene reactivated the Mid-Atlantic Association of Oracle Professionals' Database Administration Special Interest Group and is the current chair of the MAOP DBA SIG. She authors an "Ask The DBA" column for the MAOP newsletter, and her articles and columns are available at http://www.maop.org/sig-dba/. For recreation, Marlene is an avid volksmarcher who has, with her significant other, Nelson Cahill, walked at least 6.2 miles in every one of the United States. She loves to travel and has been on numerous cruises. She can be reached via email at Marlene.Theriault@jhuapl.edu.

Read More Show Less

Table of Contents

Dedication;
Preface;
What This Book Is;
What This Book Is Not;
Audience for This Book;
Conventions Used in This Book;
Platforms and Versions of Oracle;
Comments and Questions;
Acknowledgments;
Security in an oracle System;
Chapter 1: Oracle and Security;
1.1 What’s It All About?;
1.2 The Oracle Security Model;
1.3 Procedures, Policies, and Plans;
1.4 If I Had a Hammer...;
Chapter 2: Oracle System Files;
2.1 What’s in the Files?;
2.2 The Instance and the Database: Starting an Oracle Database;
2.3 Types of Database Files;
Chapter 3: Oracle Database Objects;
3.1 The User Interface: User Versus Schema;
3.2 Objects;
3.3 Tables;
3.4 Table Triggers;
3.5 Views;
3.6 Stored Programs;
3.7 Synonyms;
3.8 Privileges;
3.9 Roles;
3.10 Profiles;
Chapter 4: The Oracle Data Dictionary;
4.1 Creating and Maintaining the Data Dictionary;
4.2 The Data Dictionary Views;
4.3 About SQL.BSQ;
4.4 Views Used for Security;
4.5 The Composition of the Views;
Chapter 5: Oracle Default Roles and User Accounts;
5.1 About the Defaults;
5.2 The CONNECT Role;
5.3 The RESOURCE Role;
5.4 The DBA Role;
5.5 The SYSDBA and SYSOPER Roles;
5.6 Using the Default Roles;
5.7 Default User Accounts;
5.8 Segmenting Authority in the Database;
Chapter 6: Profiles, Passwords, and Synonyms;
6.1 Profiles;
6.2 Passwords;
6.3 Synonyms;
Implementing Security;
Chapter 7: Developing a Database Security Plan;
7.1 About the Security Policy and Security Plan;
7.2 Types of Accounts;
7.3 Standards for Accounts;
7.4 Standards for Usernames;
7.5 Standards for Passwords;
7.6 Standards for Roles;
7.7 Standards for Views;
7.8 Standards for the Oracle Security Server;
7.9 Standards for Employees;
7.10 Sample Security Plan Index;
7.11 Sample Security Plan Checklist;
Chapter 8: Installing and Starting Oracle;
8.1 Segmenting Application Processing;
8.2 Installing Oracle Securely;
8.3 Connecting to the Database Without a Password;
8.4 Installing and Configuring SQL*Net;
8.5 Setting Up Initialization Parameters for Security;
Chapter 9: Developing a Simple Security Application;
9.1 The Application Overview;
9.2 Preparing the Role-Object Matrix;
9.3 Views;
9.4 Roles;
9.5 Grants;
9.6 Application Control of Access;
Chapter 10: Developing an Audit Plan;
10.1 Why Audit?;
10.2 Where to Audit;
10.3 How Auditing Works;
10.4 Auditing and Performance;
10.5 Default Auditing;
10.6 Types of Auditing;
10.7 Purging Audit Information;
Chapter 11: Developing a Sample Audit Application;
11.1 About the Audit Trail Application;
11.2 About Performance and Storage;
11.3 Using the Audit Data in Reports;
11.4 SQL Scripts to Generate Scripts;
Chapter 12: Backing Up and Recovering the Database;
12.1 What Are the Backup Options?;
12.2 What’s New for Oracle8?;
12.3 What Are the Recovery Options?;
Chapter 13: Using the Oracle Enterprise Manager;
13.1 What Is the OEM?;
13.2 The DBA Toolkit and Security;
13.3 OEM and the Job Scheduler;
13.4 OEM and the Event Management System;
Chapter 14: Maintaining User Accounts;
14.1 Application Design Requirements;
14.2 Running the Application;
14.3 Documenting the User State;
14.4 A Sample Script;
Enhanced Oracle Security;
Chapter 15: Using the Oracle Security Server;
15.1 About Cryptography;
15.2 Ways to Authenticate Users;
15.3 What’s in the OSS?;
15.4 Configuring and Using the OSS;
Chapter 16: Using the Internet and the Web;
16.1 Web Basics;
16.2 Evaluating Web Assets and Risks;
16.3 Protecting a Web Site;
16.4 Getting Users Involved;
Chapter 17: Using Extra-Cost Options;
17.1 Trusted Oracle;
17.2 Advanced Networking Option;
17.3 Oracle Application Server;
References;
Oracle Books;
Security Books;
Oracle Electronic References;
Security Electronic References;
Colophon;

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)