E-books in Russian and English
|
| Applied Oracle Security: Developing Secure Database and Middleware Environmentsdate: 22 ноября 2009 / author: izograv / категория: Oracle / views: 1284 / comments: 0 Applied Oracle Security: Developing Secure Database and Middleware Environments by David Knox, Scott Gaetjen, Hamza Jahangir, and Tyler Muth Cutting-edge techniques from leading Oracle security experts This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications. Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today's IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security. Written by leading Oracle security experts, this Oracle Press guide shows you how to develop security applications for the Oracle environment. Applied Oracle Security explains how to maximize the security capabilities in Oracle Database, Oracle Database Vault, Oracle Identify Management, Oracle Application Express, and Oracle Business Intelligence Suite. Protect your data and applications by using the proven strategies inside this authoritative resource. * Use Oracle Transparent Data Encryption to protect sensitive information * Deploy Oracle Audit Vault to build a coherent enterprise audit strategy * Fortify your Oracle Databases with best practices from the creators of Oracle Database Vault * Apply Oracle Database Vault security controls to new and existing applications * Develop a foundation for identity management architecture using a simple and practical methodology * Apply Oracle Identity Manager to automate user provisioning processes * Create next generation user directories with Oracle Internet Directory and Oracle Virtual Directory * Build secure applications leveraging database security with Oracle Application Express * Integrate Oracle Business Intelligence Enterprise Edition and identity management solutions to control user access to data and functionality
Comments: 0
|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Design/Web/Support/Anti-Leech by izograv @ yandex.ru
Optimized for Firefox | Anti-Leech tested on IE, Firefox, Reget