Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. "In my experience in the security world, including 32 years at the Central Intelligence Agency, I've not found anyone with more experience in the theory and practice of protecting your data than David Knox." --Dave Carey, former Executive Director of the CIA
Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. "In my experience in the security world, including 32 years at the Central Intelligence Agency, I've not found anyone with more experience in the theory and practice of protecting your data than David Knox." --Dave Carey, former Executive Director of the CIAHinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
David Knox (Chantilly, VA) is the Chief Engineer for Oracle's Information Assurance Center - Oracle Corporation's Security Center of Excellence. Mr. Knox joined Oracle Corporation in June 1995. While at Oracle, Mr. Knox has worked on many security programs for the US Department of Defense, various Intelligence Agencies, Healthcare and Financial Services industries. His knowledge in computer security derives not only from working knowledge and experience with Oracle's security products and database security, but also his academic studies in the areas of multilevel security, cryptography, LDAP, and PKI. David earned a bachelor's degree in Computer Science from the University of Maryland and a master's degree in Computer Science from Johns Hopkins University.
Inhaltsangabe
PART I Quick Start 1 General Security Best Practices 2 Securing the Database PART II Identification and Authentication 3 Understanding Identification and Authentication 4 Connection Pools and Proxy Authentication 5 Identity Management and Enterprise Users 6 Identification and Authentication for Web Applications PART III Authorizations and Auditing 7 Privileges and Roles 8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
PART I Quick Start 1 General Security Best Practices 2 Securing the Database PART II Identification and Authentication 3 Understanding Identification and Authentication 4 Connection Pools and Proxy Authentication 5 Identity Management and Enterprise Users 6 Identification and Authentication for Web Applications PART III Authorizations and Auditing 7 Privileges and Roles 8 Effective Auditing for Accountability PART IV Fine-Grained Access Control 9 Application Contexts for Security and Performance 10 Implementing Fine-Grained Access Controls with Views 11 Row-Level Security with Virtual Private Database 12 Oracle Label Security 13 Database Encryption PART V Appendixes A Setting Up the Security Manager B DATA_CRYPTO Package C DBMS_CRYPTO Performance Test Results
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826