• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager

ISBN-13: 9781484253663 / Angielski / Miękka / 2019 / 341 str.

Osama Mustafa; Robert Lockard
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager Mustafa, Osama 9781484253663 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager

ISBN-13: 9781484253663 / Angielski / Miękka / 2019 / 341 str.

Osama Mustafa; Robert Lockard
cena 209,59
(netto: 199,61 VAT:  5%)

Najniższa cena z 30 dni: 208,44
Termin realizacji zamówienia:
ok. 16-18 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!
Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - General
Computers > Data Science - General
Computers > Database Administration & Management
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484253663
Rok wydania:
2019
Ilość stron:
341
Waga:
0.50 kg
Wymiary:
23.39 x 15.6 x 1.91
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 01 - Encryption

Readers will go through Transparent Data, Back-up and Network Encryption. They will learn to work with ghost data and cross border issues with networks

• Transparent Data Encryption
1. Keystore
2. Column Encryption
3. Tablespace Encryption
4. External Table Encryption
5. Ghost Data
a. How it happens
b. How to fix it.
6. Column Encryption
7. Tablespace Encryption
a. Full Database Encryption
b. Online Encryption
8. External Tables
9. Algorithms

• Backup encryption
1. RMAN
2. Data Pump
• Network
1. Configuration
a. Require
b. Request
c. Accepted
d. Rejected
2. Cross Border Issues
3. Integrity

Chapter 02 - Audit

This chapter will take readers through the audit process. They will learn about key policies and identity preservation. Readers will also take a look at how fine grain audits work.

• Identity Preservation

• Policy

• Needs to tell
1. Who
2. What
3. When 
4. Where 
5. How

• Fine Grained Audit

Chapter 03 - Virtual Private Database

This chapter will teach readers key intrusion detection tools like Database Firewall and SNORT. Readers will also get tips on managing Configuration Drift, profiles and default users. 

• Intrusion Detection tools
1. Database Firewall
2. SNORT

• Configuration Drift
1. Connections
a. New
b. Frequency
2. ORACLE_HOME
a. Tripwire
3. Objects
a. New
b. Altered
c. Dropped

• Users
1. Object Access
a. Privilege Analysis
b. Grants
Roles
S/U/I/D/E
Column
c. Fine Grained Access Control (VPD)

• Profiles

• Default users
1. Can you drop them?
2. Default password
3. Impossible password
4. Expired
5. Locked

Chapter 04 - File System Access

Readers will learn about tools to access file systems.

• Directories
• utl_file

Chapter 05 - Network access and Evaluation 

This chapter will teach readers about accessing networks with tools like ACL and DBSAT. Readers will also look at some network evaluation tools.

• ACL
• Evaluation Tools
• DBSAT

Chapter 06 - Coding 

Chapter will be about understanding secure coding standards. Readers will also learn about SQL Injection.

• Importance of secure coding standards.
• Multi-Schema database model.
1. Decorations Schema
2. Business Logic Schema
3. API Schema
4. Data Objects Schema
5. Errors / Help Desk Schema
• Public Synonyms
• Sys_context
• Accessible by
• Authid
1. Definer's rights
2. Current_user (invoker)
3. Inherit privileges
• Code Based Access control
• Sql injection
1. Secure shell
• Error messages

Chapter 07 - Single Sign On (SSO) 

Readers will be introduced to Oracle Internet Directory (OID), Oracle Access Manager (OAM) and Oracle Identity Management (OIM) by installing and configuring them to your needs. They will then learn to work with OID using command line and console. Chapter will also cover OAM integration with different applications and working with the OIM console.

• Definition for SSO
• Working with SSO
1. Oracle Internet Directory
2. Oracle Access Manager
3. Oracle Identity Access Management 

• Installation and Administration
1. OID 
2. OAM 
3. OIM 

• Working with Oracle Internet Directory
1. OID using command line
2. OID using console
3. Troubleshooting OID Issues.

• Access Control with Oracle Access Manager
1. OAM concepts
2. Integrate OAM with different applications 3. Provide access to users with OAM
4. Troubleshooting

• User Management with Oracle Identity Manager
1. OIM Concepts
2. Working with OIM console
3. OIM Connectors
4. Create your own custom connector.
5. Troubleshooting

Osama Mustafa is a database specialist, an Oracle ACE Director, Certified Oracle Professional (10g, 11g), Certified Ethical Hacker and Sun System Administrator. Osama currently works as an Oracle Instructor in the Middle East. He also works on troubleshooting and the implementation of database projects. He spends his free time on Oracle OTN forums and publishes many articles, including Oracle database articles, on his blog.


Robert P. Lockard is an Oracle ACE Director, a professional Oracle DBA, designer, developer, and project manager with more than three decades of experience. For the past twenty years he has worked as an independent consultant providing quality services to his customers at a reasonable price. Robert has worked in financial intelligence tracking money laundering, terrorist money, and identity theft. He has also worked in the cyber crimes arena tracking attacks on information systems. He specializes in evaluating and securing your Oracle database environment from threats both external and internal.

Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more about identity preservation, policies and fine-grained audits. Moving on to virtual private databases, you’ll set up and configure a VPD to work in concert with other security features in Oracle, followed by tips on managing configuration drift, profiles, and default users. 

Shifting focus to coding, you will take a look at secure coding standards, multi-schema database models, code-based access control, and SQL injection. Finally, you’ll cover single sign-on (SSO), and will be introduced to Oracle Internet Directory (OID), Oracle Access Manager (OAM), and Oracle Identity Management (OIM) by installing and configuring them to meet your needs. 

Oracle databases hold the majority of the world’s relational data, and are attractive targets for attackers seeking high-value targets for data theft. Compromise of a single Oracle Database can result in tens of millions of breached records costing millions in breach-mitigation activity. This book gets you ready to avoid that nightmare scenario.

You will:
  • Work with Oracle Internet Directory using the command-line and the console 
  • Integrate Oracle Access Manager with different applications 
  • Work with the Oracle Identity Manager console and connectors, while creating your own custom one 
  • Troubleshooting issues with OID, OAM, and OID
  • Dive deep into file system and network security concepts 



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia