Oracle security
Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases. Oracle security has many facets: Estab...
Autor Corporativo: | |
---|---|
Otros Autores: | , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified]
O'Reilly
1998
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627314406719 |
Sumario: | Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases. Oracle security has many facets: Establishing an organization's security policy and plan Protecting system files and passwords Controlling access to database objects (tables, views, rows, columns, etc.) Building appropriate user profiles, roles, and privileges Monitoring system access via audit trails Oracle and Security Oracle System Files Oracle Database Objects The Oracle Data Dictionary Default Roles and User Accounts Profiles, Passwords, and Synonyms Developing a Database Security Plan Installing and Starting Oracle Developing a Simple Security Application Developing an Audit Plan Developing a Sample Audit Application Backing Up and Recovering a Database Using the Oracle Enterprise Manager Maintaining User Accounts Using the Oracle Security Server Using the Internet and the Web Using Extra-Cost Options Oracle Security describes how these basic database security features are implemented and provides many practical strategies for securing Oracle systems and databases. It explains how to use the Oracle Enterprise Manager and Oracle Security Server to enhance your site's security, and it touches on such advanced security features as encryption, Trusted Oracle, and various Internet and World Wide Web protection strategies. A table of contents follows: Preface Part I: Security in an Oracle System Part II: Implementing Security Part III: Enhanced Oracle Security Appendix A. References |
---|---|
Notas: | Bibliographic Level Mode of Issuance: Monograph |
Descripción Física: | 1 online resource (xviii, 425 p. ) ill Available also in a print edition |
Bibliografía: | Includes bibliographical references and index. |
ISBN: | 9781565929173 |