<h4>Best Practices for Comprehensive Oracle Database Security</h4> <p>Written by renowned experts from Oracle's National Security Group, <i>Oracle Database 12c Security</i> provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant archite
Oracle Database 12c Security
β Scribed by Scott Gaetjen, David Knox, William Maroulis
- Publisher
- McGraw-Hill Education
- Year
- 2015
- Tongue
- English
- Leaves
- 552
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Best Practices for Comprehensive Oracle Database Security
Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.
- Connect users to databases in a secure manner
- Manage identity, authentication, and access control
- Implement database application security
- Provide security policies across enterprise applications using Real Application Security
- Control data access with Oracle Virtual Private Database
- Control sensitive data using data redaction and transparent sensitive data protection
- Control data access with Oracle Label Security
- Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
- Implement auditing technologies, including Unified Audit Trail
- Manage security policies and monitor a secure database environment with Oracle Enterprise Manager Cloud Control
β¦ Subjects
Data Warehousing;Databases & Big Data;Computers & Technology;Oracle;Databases & Big Data;Computers & Technology;Data Processing;Databases & Big Data;Computers & Technology;Network Security;Networking & Cloud Computing;Computers & Technology;Enterprise Applications;Software;Computers & Technology;Security & Encryption;Cryptography;Encryption;Hacking;Network Security;Privacy & Online Safety;Security Certifications;Viruses;Computers & Technology;Database Storage & Design;Computer Science;New, Used
π SIMILAR VOLUMES
Written by Oracle insiders, this indispensable guide distills an enormous amount of information about the Oracle Database into one compact volume. Ideal for novice and experienced DBAs, developers, managers, and users, Oracle Essentials walks you through technologies and features in Oracleβs product
Written by Oracle insiders, this indispensable guide distills an enormous amount of information about the Oracle Database into one compact volume. Ideal for novice and experienced DBAs, developers, managers, and users, Oracle Essentials walks you through technologies and features in Oracleβs product
Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration. The book demonstrates through coded examples how to enable the consolidation features of Oracle Database 1
Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how