E-books in Russian and English



<<< >>>

Welcome
(Seattle, Washington, United States)

 


Enter · Register · Search

 
 
   
 
 
 
« Ноябрь 2009 »
Пн Вт Ср Чт Пт Сб Вс
 1
2345678
9101112131415
16171819202122
23242526272829
30 
 
One Week Top10:
 2  3   4

Applied Oracle Security: Developing Secure Database and Middleware Environments

date: 22 ноября 2009 / author: izograv / категория: Oracle / views: 1258 / comments: 0

Applied Oracle Security: Developing Secure Database and Middleware Environments by David Knox, Scott Gaetjen, Hamza Jahangir, and Tyler Muth





Cutting-edge techniques from leading Oracle security experts

This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications.
Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today's IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.


Written by leading Oracle security experts, this Oracle Press guide shows you how to develop security applications for the Oracle environment. Applied Oracle Security explains how to maximize the security capabilities in Oracle Database, Oracle Database Vault, Oracle Identify Management, Oracle Application Express, and Oracle Business Intelligence Suite. Protect your data and applications by using the proven strategies inside this authoritative resource.

* Use Oracle Transparent Data Encryption to protect sensitive information
* Deploy Oracle Audit Vault to build a coherent enterprise audit strategy
* Fortify your Oracle Databases with best practices from the creators of Oracle Database Vault
* Apply Oracle Database Vault security controls to new and existing applications
* Develop a foundation for identity management architecture using a simple and practical methodology
* Apply Oracle Identity Manager to automate user provisioning processes
* Create next generation user directories with Oracle Internet Directory and Oracle Virtual Directory
* Build secure applications leveraging database security with Oracle Application Express
* Integrate Oracle Business Intelligence Enterprise Edition and identity management solutions to control user access to data and functionality



 

Comments: 0

 
 
Year Top:
2011
2010
2009
2008
2007
2006
 
  

 


 

Design/Web/Support/Anti-Leech by izograv @ yandex.ru
Optimized for Firefox | Anti-Leech tested on IE, Firefox, Reget