Effective Oracle Database 10g Security by Design
PART I Quick Start 1 General Security Best Practices 2 Securing the Database PART II Identification and Authentication 3 Understanding Identification and Authentication 4 Connection Pools and Proxy Authentication 5 Identity Management and Enterprise Users 6 Identification and Authentication for Web Applications PART III Authorizations and Auditing 7 Privileges and Roles 8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
2 Securing the Database PART II Identification and Authentication 3 Understanding Identification and Authentication 4 Connection Pools and Proxy Authentication 5 Identity Management and Enterprise Users 6 Identification and Authentication for Web Applications PART III Authorizations and Auditing 7 Privileges and Roles 8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
3 Understanding Identification and Authentication 4 Connection Pools and Proxy Authentication 5 Identity Management and Enterprise Users 6 Identification and Authentication for Web Applications PART III Authorizations and Auditing 7 Privileges and Roles 8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
5 Identity Management and Enterprise Users 6 Identification and Authentication for Web Applications PART III Authorizations and Auditing 7 Privileges and Roles 8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
PART III Authorizations and Auditing 7 Privileges and Roles 8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
C DBMS_CRYPTO Performance Test Results
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider
Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Designprovides all the information you need to develop and deploy secure database applications. The entire security cycle is covered--from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.
- Assess database vulnerabilities and develop effective security policies
- Preserve user identity with in-depth analyses of JDBC connection pools, proxy authentication, and client identifiers
- Manage database users from a central directory without sacrificing security
- Lock down database access using secure application roles
- Leverage application and database security within Oracle’s Identity Management infrastructure
- Validate user privileges by using simple views and scripts
- Protect individual data elements by using the new Oracle DBMS_CRYPTO package
- Exploit database views to provide row-level and column-level fine-grained access controls
- Enforce need-to-know access and data privacy with Virtual Private Database and Oracle Label Security
- Ensure user accountability with Oracle fine-grained Auditing