Items related to Oracle Database Application Security: With Oracle Internet...

Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager - Softcover

 
9781484253687: Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager

This specific ISBN edition is currently not available.

Synopsis

Chapter 01 - Encryption

Readers will go through Transparent Data, Back-up and Network Encryption. They will learn to work with ghost data and cross border issues with networks

• Transparent Data Encryption
1. Keystore
2. Column Encryption
3. Tablespace Encryption
4. External Table Encryption
5. Ghost Data
a. How it happens
b. How to fix it.
6. Column Encryption
7. Tablespace Encryption
a. Full Database Encryption
b. Online Encryption
8. External Tables
9. Algorithms

• Backup encryption
1. RMAN
2. Data Pump
• Network
1. Configuration
a. Require
b. Request
c. Accepted
d. Rejected
2. Cross Border Issues
3. Integrity

Chapter 02 - Audit

This chapter will take readers through the audit process. They will learn about key policies and identity preservation. Readers will also take a look at how fine grain audits work.

• Identity Preservation

• Policy

• Needs to tell
1. Who
2. What
3. When 
4. Where 
5. How

• Fine Grained Audit

Chapter 03 - Virtual Private Database

This chapter will teach readers key intrusion detection tools like Database Firewall and SNORT. Readers will also get tips on managing Configuration Drift, profiles and default users. 

• Intrusion Detection tools
1. Database Firewall
2. SNORT

• Configuration Drift
1. Connections
a. New
b. Frequency
2. ORACLE_HOME
a. Tripwire
3. Objects
a. New
b. Altered
c. Dropped

• Users
1. Object Access
a. Privilege Analysis
b. Grants
Roles
S/U/I/D/E
Column
c. Fine Grained Access Control (VPD)

• Profiles

• Default users
1. Can you drop them?
2. Default password
3. Impossible password
4. Expired
5. Locked

Chapter 04 - File System Access

Readers will learn about tools to access file systems.

• Directories
• utl_file

Chapter 05 - Network access and Evaluation 

This chapter will teach readers about accessing networks with tools like ACL and DBSAT. Readers will also look at some network evaluation tools.

• ACL
• Evaluation Tools
• DBSAT

Chapter 06 - Coding 

Chapter will be about understanding secure coding standards. Readers will also learn about SQL Injection.

• Importance of secure coding standards.
• Multi-Schema database model.
1. Decorations Schema
2. Business Logic Schema
3. API Schema
4. Data Objects Schema
5. Errors / Help Desk Schema
• Public Synonyms
• Sys_context
• Accessible by
• Authid
1. Definer's rights
2. Current_user (invoker)
3. Inherit privileges
• Code Based Access control
• Sql injection
1. Secure shell
• Error messages

"synopsis" may belong to another edition of this title.

(No Available Copies)

Search Books:



Create a Want

Can't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!

Create a Want

Other Popular Editions of the Same Title

9781484253663: Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager

Featured Edition

ISBN 10:  1484253663 ISBN 13:  9781484253663
Publisher: Apress, 2019
Softcover