Effective Oracle Database 10g Security by Design

  • Authors:
  • David Knox

  • Affiliations:
  • -

  • Venue:
  • Effective Oracle Database 10g Security by Design
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. “In my experience in the security world, including 32 years at the Central Intelligence Agency, I’ve not found anyone with more experience in the theory and practice of protecting your data than David Knox.” --Dave Carey, former Executive Director of the CIA Table of contents PART I Quick Start 1 General Security Best Practices 2 Securing the Database PART II Identification and Authentication 3 Understanding Identification and Authentication 4 Connection Pools and Proxy Authentication 5 Identity Management and Enterprise Users 6 Identification and Authentication for Web Applications PART III Authorizations and Auditing 7 Privileges and Roles 8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results