Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protecting Oracle Database 12c

Buy
Protecting Oracle Database 12c, 9781430262114 (1430262117), Apress, 2014

Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation features of Oracle Database 12c without increasing risk of either internal corruption or external vulnerability. In addition, new protections not publicly available are included, so that you can see how demonstrable risk improvements can be achieved, measured, and reported through Enterprise Manager 12c. Most importantly, the challenge of privileged access control within a consolidation environment will be addressed, thus enabling a safe move to greater efficiency.

What you’ll learn

  • Oracle database security issues and how to defend against new risks introduced by Oracle Database 12c and pre-existing architectural vulnerabilities, such as incoming DBlinks
  • Control and audit the use of SYS privilege over a large estate using native tools
  • Use Oracle native audit as an IPS to block threats in real-time
  • Leverage root segregation to secure Oracle DB
  • Secure privileged access control and break-glass sessions
  • Scale automated security controls through Enterprise Manager to a large estate
  • Improve your ability to pass audits and stay compliant

Who this book is for

Protecting Oracle Database 12c is primarily aimed at Oracle database administrators, DBA managers, and security staff who are working to safely and securely implement Oracle Database 12c in their environment. The book especially targets those using privileged access control to enable consolidation and the new cloud features set, including it’s multi-tenant database capabilities.

(HTML tags aren't allowed.)

Apache Maven 2 Effective Implementation
Apache Maven 2 Effective Implementation

Build and Manage Applications with Maven, Continuum, and Archiva

  • Follow a sample application which will help you to get started quickly with Apache Maven
  • Learn how to use Apache Archiva - an extensible repository manager - with Maven to take care of your build artifact repository
  • Leverage the...
PHP Cookbook
PHP Cookbook

When it comes to creating dynamic web sites, the open source PHP language is red-hot property: used on more than 20 million web sites today, PHP is now more popular than Microsoft's ASP.NET technology. With our Cookbook's unique format, you can learn how to build dynamic web applications that work on any web browser....

Custom Raspberry Pi Interfaces: Design and build hardware interfaces for the Raspberry Pi
Custom Raspberry Pi Interfaces: Design and build hardware interfaces for the Raspberry Pi

Design and build custom hardware interfaces for the Raspberry Pi and discover low cost display and sensor options for embedded system projects. 

With this book you'll master 12C communications using Raspbian Linux in C++ and perform ADC and DAC experiments. You'll experiment with debounce buttons and switches using...


Philosophical Investigations on Time, Space and the Continuum (Routledge Revivals)
Philosophical Investigations on Time, Space and the Continuum (Routledge Revivals)

Franz Brentano is recognised as one of the most important philosophers of the late nineteenth and early twentieth centuries. This work, first published in English in 1988, besides being an important contribution to metaphysics in its own right, has considerable historical importance through its influence on Husserl’s views on internal time...

Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Oracle E-Business Suite R12 Core Development and Extension Cookbook
Oracle E-Business Suite R12 Core Development and Extension Cookbook
This book is about extending Oracle E-Business Suite (EBS). Throughout the book there are detailed examples to work through with tips and explanations about how various components are configured and how we can extend standard functionality. The book is aimed at developers who are new to E-Business Suite or those who are strong in...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy