Printed
Applied Oracle Security: Developing Secure Database and Middleware Environments
Contents at a Glance:
PART I ORACLE DATABASE SECURITY NEW FEATURES(3-89):
1 Security Blueprints & New Thinking , 3-20
2 Transparent Data Encryption , 21-56
3 Applied Auditing & Audit Vault , 57-89.
PART II ORACLE DATABASE VAULT (93-353):
4 Database Vault Introduction , 93-116
5 Database Vault Fundamentals , 117-198
6 Applied Database Vault forCustom Applications,199
7 Applied Database Vault for Existing Applications.
PART III IDENTITY MANAGEMENT (357-430):
8 Architecting Identity Management , 357-384
9 Oracle Identity Manager , 385-404
10 Oracle Directory Services , 405-432.
PART IV APPLIED SECURITY for ORACLE APEX & ORACLE
BUSINESS INTELLIGENCE (433-592):
11 Web-centric Security in APEX , 433-460
12 Secure Coding Practices in APEX , 461-496
13 Securing Access to Oracle BI , 497-534
14 Securing Oracle BI Content & Data , 535-578
Using the Oracle BI Examples , 579-592.
Cutting Edge Oracle Security Techniques
Written by leading Oracle security experts, this Oracle Press guide shows you how to develop secure applications for the Oracle environment. Applied Oracle Security explains how to maximize the security capabilities in Oracle Database, Oracle Database Vault, Oracle Identity Management, Oracle Application Express, & Oracle Business Intelligence Suite. Protect your data & applications by using the proven strategies inside this authoritative resource.
Tidak tersedia versi lain