118,07 €
131,19 €
-10% with code: EXTRA
Effective Oracle Database 10g Security by Design
Effective Oracle Database 10g Security by Design
118,07
131,19 €
  • We will send in 10–14 business days.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security InsiderOracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by De…
  • SAVE -10% with code: EXTRA

Effective Oracle Database 10g Security by Design (e-book) (used book) | bookbook.eu

Reviews

(3.69 Goodreads rating)

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider

Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Designprovides all the information you need to develop and deploy secure database applications. The entire security cycle is covered--from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.

  • Assess database vulnerabilities and develop effective security policies
  • Preserve user identity with in-depth analyses of JDBC connection pools, proxy authentication, and client identifiers
  • Manage database users from a central directory without sacrificing security
  • Lock down database access using secure application roles
  • Leverage application and database security within Oracle's Identity Management infrastructure
  • Validate user privileges by using simple views and scripts
  • Protect individual data elements by using the new Oracle DBMS_CRYPTO package
  • Exploit database views to provide row-level and column-level fine-grained access controls
  • Enforce need-to-know access and data privacy with Virtual Private Database and Oracle Label Security
  • Ensure user accountability with Oracle fine-grained Auditing




EXTRA 10 % discount with code: EXTRA

118,07
131,19 €
We will send in 10–14 business days.

The promotion ends in 20d.14:40:48

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,31 Book Euros!?

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider

Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Designprovides all the information you need to develop and deploy secure database applications. The entire security cycle is covered--from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.

  • Assess database vulnerabilities and develop effective security policies
  • Preserve user identity with in-depth analyses of JDBC connection pools, proxy authentication, and client identifiers
  • Manage database users from a central directory without sacrificing security
  • Lock down database access using secure application roles
  • Leverage application and database security within Oracle's Identity Management infrastructure
  • Validate user privileges by using simple views and scripts
  • Protect individual data elements by using the new Oracle DBMS_CRYPTO package
  • Exploit database views to provide row-level and column-level fine-grained access controls
  • Enforce need-to-know access and data privacy with Virtual Private Database and Oracle Label Security
  • Ensure user accountability with Oracle fine-grained Auditing




Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)