Contents: 1. Operating system security 2. Securing the network and data in transit 3. Securing data at rest 4. Authentication and user security 5. Beyond privileges: oracle virtual privat database 6. Beyond privileges: oracle label security 7. Beyond privileges: oracle database vault 8. Tracking and analisys: database auditing and analysis: database auditing