Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Oracle Database 12c Security - Scott Gaetjen, David Knox, William Maroulis

Oracle Database 12c Security

Buch | Softcover
552 Seiten
2015
McGraw-Hill Professional (Verlag)
978-0-07-182428-6 (ISBN)
CHF 134,40 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
Renowned Oracle security expert David Knox provides trusted advice and best practices for comprehensive Oracle Database security. Key capabilities from the five major database releases with a sustained focus on the newest release are provided. Code samples and design templates implemented by top Oracle Database security architects are included.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Best Practices for Comprehensive Oracle Database SecurityWritten by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.



Connect users to databases in a secure manner
Manage identity, authentication, and access control
Implement database application security
Provide security policies across enterprise applications using Real Application Security
Control data access with OracleVirtual Private Database
Control sensitive data using data redaction and transparent sensitive data protection
Control data access with Oracle Label Security
Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
Implement auditing technologies, including Unified Audit Trail
Manage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control

Scott G. Gaetjen Senior Technical Director Oracle National Security Group Scott Gaetjen conducts research and design on new security solutions, leveraging his 20+ years of experience with Oracle-based technologies to provide advanced security capabilities to Oracle’s customers. Mr. Gaetjen has served as the technical lead and mentor on many projects for customers in the defense, finance, healthcare, intelligence and telecommunications industries. In the process of helping these customers meet their organizational objectives, Mr. Gaetjen has developed a keen technical understanding of operating system security, Oracle database security, J2EE application security and identity management. Mr. Gaetjen is the co-inventor of a handful of patents that led to the development of the Oracle Database Vault product. Mr. Gaetjen co-authored the book "Applied Oracle Security" from Oracle Press in 2010. Mr. Gaetjen holds a bachelor’s degree in Mathematics from James Madison University and a master’s degree in Computer Systems Management from the University of Maryland University College. David Knox (Chantilly, VA) is the Chief Engineer for Oracle's Information Assurance Center – Oracle Corporation's Security Center of Excellence. Mr. Knox joined Oracle Corporation in June 1995. While at Oracle, Mr. Knox has worked on many security programs for the US Department of Defense, various Intelligence Agencies, Healthcare and Financial Services industries. His knowledge in computer security derives not only from working knowledge and experience with Oracle's security products and database security, but also his academic studies in the areas of multilevel security, cryptography, LDAP, and PKI. David earned a bachelor's degree in Computer Science from the University of Maryland and a master's degree in Computer Science from Johns Hopkins University.

1) Database Vault for privileged users/objects/commands 2) Separation of Duties3) Virtual Private Database for row/column/cell security4) Label based access control5) Secure Application Context 6) Sensitive data discovery7) Least privilege analysis8) Multi-factor auditing and redaction9) Real Application Security10) Code-based access control (CBAC) associates privileges with code11) Transparent Sensitive Data Protection associates policies with sensitive columns

Zusatzinfo 80 Illustrations
Sprache englisch
Maße 183 x 229 mm
Gewicht 812 g
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
ISBN-10 0-07-182428-6 / 0071824286
ISBN-13 978-0-07-182428-6 / 9780071824286
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Datenanalyse für Künstliche Intelligenz

von Jürgen Cleve; Uwe Lämmel

Buch | Softcover (2024)
De Gruyter Oldenbourg (Verlag)
CHF 104,90
Auswertung von Daten mit pandas, NumPy und IPython

von Wes McKinney

Buch | Softcover (2023)
O'Reilly (Verlag)
CHF 62,85