Inicio > > Seguridad informática > Oracle Database Application Security
Oracle Database Application Security

Oracle Database Application Security

Osama Mustafa / Robert P. Lockard

65,96 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2019
Materia
Seguridad informática
ISBN:
9781484253663
65,96 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more about identity preservation, policies and fine-grained audits. Moving on to virtual private databases, you’ll set up and configure a VPD to work in concert with other security features in Oracle, followed by tips on managing configuration drift, profiles, and default users. Shifting focus to coding, you will take a look at secure coding standards, multi-schema database models, code-based access control, and SQL injection. Finally, you’ll cover single sign-on (SSO), and will be introduced to Oracle Internet Directory (OID), Oracle Access Manager (OAM), and Oracle Identity Management (OIM) by installing and configuring them to meet your needs. Oracle databases hold the majority of the world’s relational data, and are attractive targets for attackers seeking high-value targets for data theft. Compromise of a single Oracle Database can result in tens of millions of breached records costing millions in breach-mitigation activity. This book gets you ready to avoid that nightmare scenario.What You Will LearnWork with Oracle Internet Directory using the command-line and the console Integrate Oracle Access Manager with different applications Work with the Oracle Identity Manager console and connectors, while creating your own custom one Troubleshooting issues with OID, OAM, and OIDDive deep into file system and network security concepts Who This Book Is ForOracle DBAs and developers. Readers will need a basic understanding of Oracle RDBMS and Oracle Application Server to take complete advantage of this book.

Artículos relacionados

  • Information Security and Ethics
    Quigley
    ...
  • Cybersecurity Fundamentals Explained
    Brian Mackay
    The issue of Cybersecurity is of paramount importance in the digital age. With near-continuous revelations about incidents and breaches in the media, organizations and individuals are faced with the challenge of finding the balance between risk, innovation, and cost. At the same time, the field of cybersecurity is undergoing dramatic changes, demanding that organizations embrac...
    Disponible

    22,44 €

  • Improving Security, Privacy, and Trust in Cloud Computing
    Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud’s scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of chall...
  • Enhancing Performance, Efficiency, and Security Through Complex Systems Control
    Academic scholars and professionals in engineering strive to enhance the performance, efficiency, and security of complex systems, but accessing comprehensive resources for these challenges can be daunting. Enhancing Performance, Efficiency, and Security Through Complex Systems Control offers an ideal solution. Edited by esteemed academics Idriss Chana, Aziz Bouazi, and Hussain...
    Disponible

    294,76 €

  • Enhancing Performance, Efficiency, and Security Through Complex Systems Control
    Academic scholars and professionals in engineering strive to enhance the performance, efficiency, and security of complex systems, but accessing comprehensive resources for these challenges can be daunting. Enhancing Performance, Efficiency, and Security Through Complex Systems Control offers an ideal solution. Edited by esteemed academics Idriss Chana, Aziz Bouazi, and Hussain...
  • Emerging Technologies and Security in Cloud Computing
    In today’s digital age, the exponential growth of cloud computing services has brought significant opportunities for businesses and individuals alike. However, this surge in cloud adoption has also ushered in a host of critical concerns, with the paramount issues being data privacy and security. The goal of protecting sensitive information from cyber threats and ensuring confid...