Skip to main content

ISBN10: 0072231300 | ISBN13: 9780072231304

ISBN10: 0072231300
ISBN13: 9780072231304
By David Knox

Step 1. Download Adobe Digital Editions to your PC or Mac desktop/laptop.

Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.

Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider

Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Designprovides all the information you need to develop and deploy secure database applications. The entire security cycle is covered--from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.

  • Assess database vulnerabilities and develop effective security policies
  • Preserve user identity with in-depth analyses of JDBC connection pools, proxy authentication, and client identifiers
  • Manage database users from a central directory without sacrificing security
  • Lock down database access using secure application roles
  • Leverage application and database security within Oracle’s Identity Management infrastructure
  • Validate user privileges by using simple views and scripts
  • Protect individual data elements by using the new Oracle DBMS_CRYPTO package
  • Exploit database views to provide row-level and column-level fine-grained access controls
  • Enforce need-to-know access and data privacy with Virtual Private Database and Oracle Label Security
  • Ensure user accountability with Oracle fine-grained Auditing




PART I Quick Start

1 General Security Best Practices

2 Securing the Database

PART II Identification and Authentication

3 Understanding Identification and Authentication

4 Connection Pools and Proxy Authentication

5 Identity Management and Enterprise Users

6 Identification and Authentication for Web Applications

PART III Authorizations and Auditing

7 Privileges and Roles

8 Effective Auditing for Accountability

PART IV Fine-Grained Access Control

9 Application Contexts for Security and Performance

10 Implementing Fine-Grained Access Controls with Views

11 Row-Level Security with Virtual Private Database

12 Oracle Label Security

13 Database Encryption

PART V Appendixes

A Setting Up the Security Manager

B DATA_CRYPTO Package

C DBMS_CRYPTO Performance Test Results

Need support?   We're here to help - Get real-world support and resources every step of the way.

Top