Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Oracle Database 12c Security Cookbook

    Posted By: AlenMiler
    Oracle Database 12c Security Cookbook

    Oracle Database 12c Security Cookbook by Zoran Pavlovic
    English | 6 Jun. 2016 | ASIN: B0171UHJJG | 388 Pages | AZW3 | 18.09 MB

    Key Features

    Explore and learn the new security features introduced in Oracle Database 12c, to successfully secure your sensitive data
    Learn how to identify which security strategy is right for your needs – and how to apply it
    Each 'recipe' provides you with a single step-by-step solution, making this book a vital resource, delivering Oracle support in one accessible place

    Book Description

    Businesses around the world are paying much greater attention toward database security than they ever have before. Not only does the current regulatory environment require tight security, particularly when dealing with sensitive and personal data, data is also arguably a company's most valuable asset - why wouldn't you want to protect it in a secure and reliable database? Oracle Database lets you do exactly that. It's why it is one of the world's leading databases – with a rich portfolio of features to protect data from contemporary vulnerabilities, it's the go-to database for many organizations.

    Oracle Database 12c Security Cookbook helps DBAs, developers, and architects to better understand database security challenges. Let it guide you through the process of implementing appropriate security mechanisms, helping you to ensure you are taking proactive steps to keep your data safe. Featuring solutions for common security problems in the new Oracle Database 12c, with this book you can be confident about securing your database from a range of different threats and problems.

    What you will learn

    Analyze application privileges and reduce the attack surface
    Reduce the risk of data exposure by using Oracle Data Redaction and Virtual Private Database
    Control data access and integrity in your organization using the appropriate database feature or option
    Learn how to protect your databases against application bypasses
    Audit user activity using the new auditing architecture
    Restrict highly privileged users from accessing data
    Encrypt data in Oracle Database
    Work in a real-world environment where a multi-layer security strategy is applied

    About the Author

    Zoran Pavlovic has worked on various complex database environments including RAC, ASM, Data Guard, GoldenGate, and so on. Areas of his expertise are security, performance/SQL tuning and high availabilty/disaster recovery of Oracle database. He has been working as an instructor for Oracle University since 2010 and during that time he has trained more than 200 students in Europe. In the last couple of years, Zoran has also been working on projects for Oracle Consulting. He is an Oracle ACE and he has been featured speaker/author at many conferences/magazines. He was actively engaged in beta testing Oracle Database 12c. Currently, Zoran is working as an Oracle Technical Architect in Parallel d.o.o. Belgrade.

    Maja Veselica, MSc in software engineering, is currently working for Parallel d.o.o., Belgrade, as an Oracle Database consultant (security, performance tuning, and so on). She has been working as an instructor for Oracle University since 2010. In the last couple of years, she has also been working for Oracle Consulting. Also, Maja is a member of Oracle ACE Program and has more than 20 Oracle certificates. She enjoys (beta) testing Oracle products and participating in other Oracle-related activities.

    Table of Contents

    Basic Database Security
    Security Considerations in Multitenant Environment
    PL/SQL Security
    Virtual Private Database
    Data Redaction
    Transparent Sensitive Data Protection
    Privilege Analysis
    Transparent Data Encryption
    Database Vault
    Unified Auditing
    Additional Topics
    Appendix – Application Contexts