Flylib.com
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
010 - Main
011 - TOC
012 - Copyright
013 - Dedication
014 - Preface
015 - What This Book Is
016 - What This Book Is Not
017 - Audience for This Book
018 - Conventions Used in This Book
019 - Platforms and Versions of Oracle
020 - Comments and Questions
021 - Acknowledgments
022 - Part I: Security in an oracle System
023 - Chapter 1. Oracle and Security
024 - 1.1 What s It All About?
025 - 1.2 The Oracle Security Model
026 - 1.3 Procedures, Policies, and Plans
027 - 1.4 If I Had a Hammer...
028 - Chapter 2. Oracle System Files
029 - 2.1 What s in the Files?
030 - What the Oracle System Files Really Are
031 - 2.3 Types of Database Files
032 - Chapter 3. Oracle Database Objects
033 - 3.1 The User Interface: User Versus Schema
034 - 3.2 Objects
035 - 3.3 Tables
036 - 3.4 Table Triggers
037 - 3.5 Views
038 - 3.6 Stored Programs
039 - 3.7 Synonyms
040 - 3.8 Privileges
041 - 3.9 Roles
042 - 3.10 Profiles
043 - Chapter 4. The Oracle Data Dictionary
044 - 4.1 Creating and Maintaining the Data Dictionary
045 - 4.2 The Data Dictionary Views
046 - 4.3 About SQL.BSQ
047 - 4.4 Views Used for Security
048 - 4.5 The Composition of the Views
049 - Chapter 5. Oracle Default Roles and User Accounts
050 - 5.1 About the Defaults
051 - 5.2 The CONNECT Role
052 - 5.3 The RESOURCE Role
053 - 5.4 The DBA Role
054 - New Default Roles in Oracle8
055 - 5.6 Using the Default Roles
056 - 5.7 Default User Accounts
057 - 5.8 Segmenting Authority in the Database
058 - Chapter 6. Profiles, Passwords, and Synonyms
059 - 6.1 Profiles
060 - 6.2 Passwords
061 - Tips for Creating Synonyms
062 - Part II: Implementing Security
063 - Chapter 7. Developing a Database Security Plan
064 - 7.1 About the Security Policy and Security Plan
065 - 7.2 Types of Accounts
066 - 7.3 Standards for Accounts
067 - 7.4 Standards for Usernames
068 - 7.5 Standards for Passwords
069 - 7.6 Standards for Roles
070 - 7.7 Standards for Views
071 - 7.8 Standards for the Oracle Security Server
072 - 7.9 Standards for Employees
073 - 7.10 Sample Security Plan Index
074 - 7.11 Sample Security Plan Checklist
075 - Chapter 8. Installing and Starting Oracle
076 - 8.1 Segmenting Application Processing
077 - 8.2 Installing Oracle Securely
078 - 8.3 Connecting to the Database Without a Password
079 - 8.4 Installing and Configuring SQLNet
080 - 8.5 Setting Up Initialization Parameters for Security
081 - Chapter 9. Developing a Simple Security Application
082 - 9.1 The Application Overview
083 - 9.2 Preparing the Role-Object Matrix
084 - 9.3 Views
085 - 9.4 Roles
086 - 9.5 Grants
087 - 9.6 Application Control of Access
088 - Chapter 10. Developing an Audit Plan
089 - 10.1 Why Audit?
090 - 10.2 Where to Audit
091 - 10.3 How Auditing Works
092 - 10.4 Auditing and Performance
093 - 10.5 Default Auditing
094 - 10.6 Types of Auditing
095 - 10.7 Purging Audit Information
096 - Chapter 11. Developing a Sample Audit Application
099 - 11.3 Using the Audit Data in Reports
098 - 11.2 About Performance and Storage
097 - 11.1 About the Audit Trail Application
100 - 11.4 SQL Scripts to Generate Scripts
101 - Chapter 12. Backing Up and Recovering the Database
102 - 12.1 What Are the Backup Options?
103 - 12.2 What s New for Oracle8?
104 - Backup and Recovery Reminders
105 - Chapter 13. Using the Oracle Enterprise Manager
106 - 13.1 What Is the OEM?
107 - 13.2 The DBA Toolkit and Security
108 - 13.3 OEM and the Job Scheduler
109 - 13.4 OEM and the Event Management System
110 - Chapter 14. Maintaining User Accounts
111 - 14.1 Application Design Requirements
112 - 14.2 Running the Application
113 - 14.3 Documenting the User State
114 - A Disclaimer
115 - Part III: Enhanced Oracle Security
116 - Chapter 15. Using the Oracle Security Server
117 - 15.1 About Cryptography
118 - 15.2 Ways to Authenticate Users
119 - 15.3 What s in the OSS?
120 - 15.4 Configuring and Using the OSS
121 - Chapter 16. Using the Internet and the Web
122 - 16.1 Web Basics
123 - 16.2 Evaluating Web Assets and Risks
124 - 16.3 Protecting a Web Site
125 - 16.4 Getting Users Involved
126 - Chapter 17. Using Extra-Cost Options
127 - 17.1 Trusted Oracle
128 - 17.2 Advanced Networking Option
129 - 17.3 Oracle Application Server
130 - Appendix A. References
131 - A.1 Oracle Books
132 - A.2 Security Books
133 - A.3 Oracle Electronic References
134 - A.4 Security Electronic References
135 - Colophon
136 - Index
137 - SYMBOL
138 - A
139 - B
140 - C
141 - D
142 - E
143 - F
144 - G
145 - H
146 - I
147 - J
148 - K
149 - L
150 - M
151 - N
152 - O
153 - P
154 - Q
155 - R
156 - S
157 - T
158 - U
159 - V
160 - W
161 - X
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154
Authors:
Marlene L. Theriault
,
Aaron Newman
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Integration Strategies and Tactics for Information Technology Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
The CISSP and CAP Prep Guide: Platinum Edition
Business Continuity Planning and Disaster Recovery Planning
Understanding Certification and Accreditation
Initiation of the System Authorization Process
Appendix B Glossary of Terms and Acronyms
Appendix E The Information System Security Management Professional (ISSMP) Certification
A Practitioners Guide to Software Test Design
State-Transition Testing
Domain Analysis Testing
Section III - Testing Paradigms
Exploratory Testing
Defect Taxonomies
Cisco CallManager Fundamentals (2nd Edition)
Call Routing
Troubleshooting
Overview of Station Device Features Supported by CallManager
Media Processing Overview
Client Solutions
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 4. Connect Linux with a Bluetooth Phone
Hack 13. Remote Control Windows with Bluetooth Phones and PDAs
Hack 42. Secure Your Linux Network with WPA
Hack 66. Filter MAC with HostAP and Madwifi
Section A.10. 802.1x: Port Security for Network Communications
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Hardware Overview
IP Version 6
Summary
Additional IPS Features
Advanced Features
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies