Skip to main content

ISBN10: 0071824286 | ISBN13: 9780071824286

ISBN10: 0071824286
ISBN13: 9780071824286
By Scott Gaetjen, David Knox and William Maroulis

Step 1. Download Adobe Digital Editions to your PC or Mac desktop/laptop.

Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.

Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.

  • Connect users to databases in a secure manner
  • Manage identity, authentication, and access control
  • Implement database application security
  • Provide security policies across enterprise applications using Real Application Security
  • Control data access with OracleVirtual Private Database
  • Control sensitive data using data redaction and transparent sensitive data protection
  • Control data access with Oracle Label Security
  • Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
  • Implement auditing technologies, including Unified Audit Trail
  • Manage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control

1) Database Vault for privileged users/objects/commands 2) Separation of Duties3) Virtual Private Database for row/column/cell security4) Label based access control5) Secure Application Context 6) Sensitive data discovery7) Least privilege analysis8) Multi-factor auditing and redaction9) Real Application Security10) Code-based access control (CBAC) associates privileges with code11) Transparent Sensitive Data Protection associates policies with sensitive columns

Need support?   We're here to help - Get real-world support and resources every step of the way.

Top