Oracle Database 12c Security
McGraw-Hill Professional (Verlag)
978-0-07-182428-6 (ISBN)
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Best Practices for Comprehensive Oracle Database SecurityWritten by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.
Connect users to databases in a secure manner
Manage identity, authentication, and access control
Implement database application security
Provide security policies across enterprise applications using Real Application Security
Control data access with OracleVirtual Private Database
Control sensitive data using data redaction and transparent sensitive data protection
Control data access with Oracle Label Security
Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
Implement auditing technologies, including Unified Audit Trail
Manage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control
Scott G. Gaetjen Senior Technical Director Oracle National Security Group Scott Gaetjen conducts research and design on new security solutions, leveraging his 20+ years of experience with Oracle-based technologies to provide advanced security capabilities to Oracle’s customers. Mr. Gaetjen has served as the technical lead and mentor on many projects for customers in the defense, finance, healthcare, intelligence and telecommunications industries. In the process of helping these customers meet their organizational objectives, Mr. Gaetjen has developed a keen technical understanding of operating system security, Oracle database security, J2EE application security and identity management. Mr. Gaetjen is the co-inventor of a handful of patents that led to the development of the Oracle Database Vault product. Mr. Gaetjen co-authored the book "Applied Oracle Security" from Oracle Press in 2010. Mr. Gaetjen holds a bachelor’s degree in Mathematics from James Madison University and a master’s degree in Computer Systems Management from the University of Maryland University College. David Knox (Chantilly, VA) is the Chief Engineer for Oracle's Information Assurance Center – Oracle Corporation's Security Center of Excellence. Mr. Knox joined Oracle Corporation in June 1995. While at Oracle, Mr. Knox has worked on many security programs for the US Department of Defense, various Intelligence Agencies, Healthcare and Financial Services industries. His knowledge in computer security derives not only from working knowledge and experience with Oracle's security products and database security, but also his academic studies in the areas of multilevel security, cryptography, LDAP, and PKI. David earned a bachelor's degree in Computer Science from the University of Maryland and a master's degree in Computer Science from Johns Hopkins University.
1) Database Vault for privileged users/objects/commands 2) Separation of Duties3) Virtual Private Database for row/column/cell security4) Label based access control5) Secure Application Context 6) Sensitive data discovery7) Least privilege analysis8) Multi-factor auditing and redaction9) Real Application Security10) Code-based access control (CBAC) associates privileges with code11) Transparent Sensitive Data Protection associates policies with sensitive columns
Zusatzinfo | 80 Illustrations |
---|---|
Sprache | englisch |
Maße | 183 x 229 mm |
Gewicht | 812 g |
Themenwelt | Informatik ► Datenbanken ► Data Warehouse / Data Mining |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
ISBN-10 | 0-07-182428-6 / 0071824286 |
ISBN-13 | 978-0-07-182428-6 / 9780071824286 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich