Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Applied oracle security: developing secure database and middleware environtments
Bookmark Share

Text

Applied oracle security: developing secure database and middleware environtments

Knox, David - Personal Name; Gaetjen, Scott - Personal Name; Jahangir, Hamza - Personal Name; Muth, Tyler - Personal Name; Sack, Patcrick - Personal Name; Wark, Richard - Personal Name; Wise, Bryan - Personal Name;

Contents

Part I: Oracle Database Security New Features
Chapter 1. Security Blueprints and New Thinking
1.1. About this Book
1.2. Database Security Today
1.3. Security Motivators
1.4. Modeling Secure Schemas
1.5. Getting Started
1.6. Summary

Chapter 2. Transparent Data Encryption
2.1. Encryption 101
2.2. Encrypting Data Stored in the Database
2.3. The Transparent Data Encryption Solution
2.4. Tablespace Encryption: New with Oracle 11g
2.5. Oracle 11g Configuration
2.6. Summary

Chapter 3. Applied Auditing and Audit Vault
3.1. An Era of Governance
3.2. Auditing for Nonsecurity Reasons
3.3. The Audit Data Warehouse
3.4. What to Audit and When to Audit
3.5. The Audit Warehouse Becomes the Audit Vault
3.6. Installation Options
3.7. Summary

Part II: Oracle Database Vault
Chapter 4. Database Vault Introduction
4.1. The Security Gap
4.2. Database Vault Components
4.3. Installing Oracle Database Vault
4.4. Summary

Chapter 5. Database Vault Fundamentals
5.1. Realms
5.2. Command Rules
5.3. Rule Sets
5.4. Factors
5.5. DBV Secure Application Roles
5.6. Summary

Chapter 6. Applied Database Vault for Custom Applications
6.1. Notional Database Application Environment
6.2. From Requirements to Security Profile Design
6.3. Requirements Technique: Use Cases and Scenarios
6.4. Identify Coarse-Grained Security Profile
6.5. Identify Fine-Grained Security Profile
6.6. Identify DBV Factors Based on Business or System Conditions
6.7. Identify DBV Realms and Realm Objects Based on Objects
6.8. Identify Accounts, Roles, and DBV Realm Authorization from Use Case Actors
6.9. Establish DBV Command Rules from Conditions
6.10. Establish DBV Secure Application Roles from Conditions
6.11. Summary

Chapter 7. Applied Database Vault for Existing Applications
7.1. Audit Capture Preparation
7.2. Capturing Audits
7.3. Analyzing the Audit Trail
7.4. Integrating DBV with Oracle Database Features
7.5. Advanced Monitoring and Alerting with a DBV Database
7.6. Summary

Part III: Identify Management
Chapter 8. Architecting Identify Management
8.1. Understanding the Problem with Identify Management
8.2. Architecting Identify Management
8.3. Oracle Identify Management Solutions
8.4. Summary

Chapter 9. Oracle Identify Manager
9.1. The User Provisioning Challenge
9.2. Oracle Identify Manager Overview
9.3. User Provisioning Processes
9.4. User Provisioning Integrations
9.5. Reconciliation Solutions
9.6. Compliance Solutions
9.7. OIM Deployment
9.8. Summary

Chapter 10. Oracle Directory Services
10.1. Identify Management and the LDAP Directory
10.2. Oracle Internet Directory
10.3. Directory Visualization and the Oracle Virtual Directory
10.4. OVD Applied
10.5. Summary

Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence
Chapter 11. Web-centric Security in APEX
11.1. Introducing to the APEX Environment
11.2. Securing an APEX Instance
11.3. Protecting the APEX Database Schemas
11.4. Summary

Chapter 12. Secure Coding Practices in APEX
12.1. Authentication and Authorization
12.2. SQL Injection
12.3. Cross-site Scripting
12.4. Leveraging Database Security Features
12.5. Summary

Chapter 13. Securing Access to Oracle BI
13.1. The Challenge in Securing BI
13.2. What Needs to Be Secured
13.3. Mechanics of Accessing Data with Oracle BI
13.4. Single Sing-On
13.5. Deploying in a Secure Environment
13.6. Securing the BI Chace
13.7. Public-facing Applications
13.8. Summary

Chapter 14. Securing Oracle BI Content and Data
14.1. Securing Web Catalog Content
14.2. Conveying Identity to the Database
14.3. Securing Data Presented by Oracle BI
14.4. Oracle BI and Database Vault
14.5. Auditing
14.6. BI Features with Security Implications
14.7. Summary

A. Using the Oracle BI Examples
1. Users and Groups
2. Database Preparations
3. Oracle BI Setup
4. Recommend Testing
5. Sample Web Catalog Description
6. Sample RPD Description
7. Summary


Availability
#
Perpustakaan Poltek SSN 439
000 01213
Available
Detail Information
Series Title
-
Call Number
005 KNO A
Publisher
United States of America : The McGraw -Hill Companies., 2010
Collation
xxv. 610 hal.; ilus.; 23 cm
Language
English
ISBN/ISSN
9780071613705
Classification
005
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
-
Specific Detail Info
-
Statement of Responsibility
David Knox, et all
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?