000 02200cam a2200325 a 4500
001 15919162
005 20240318183500.0
008 090923s2010 nyua 001 0 eng
010 _a 2009037612
020 _a9780071613705 (alk. paper)
020 _a0071613706 (alk. paper)
035 _a(OCoLC)ocn233549691
040 _aDLC
_cDLC
_dABK
_eRDA
050 0 0 _aQA76.9.A25
_bA67 2010
082 0 0 _222
_a005.8
_bAPP
245 0 0 _aApplied Oracle security :
_bdeveloping secure database and middleware environments /
_cDavid C. Knox ... [et al.].
260 _aNew York :
_bMcGraw-Hill,
_cc2010.
300 _axxv, 610 pages :
_billustration;
_c23 cm.
500 _aIncludes index.
505 _aPart I: Oracle Database Security New Features; Chapter 1. Security Blueprints and New Thinking; Chapter 2. Transparent Data Encryption; Chapter 3. Applied Auditing and Audit Vault; Part II: Oracle Database Vault; Chapter 4. Database Vault Introduction; Chapter 5. Database Vault Fundamentals; Chapter 6. Applied Database Vault for Custom Applications; Chapter 7. Applied Database Vault for Existing Applications; Part III: Identity Management; Chapter 8. Architecting Identity Management; Chapter 9. Oracle Identity Manager; Chapter 10. Oracle Directory Services; Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence; Chapter 11. Web-centric Security in APEX; Chapter 12. Secure Coding Practices in APEX; Chapter 13. Securing Access to Oracle BI; Chapter 14. Securing Oracle BI Content and Data; Appendix A. Using the Oracle BI Examples; Index
520 _aCutting-edge techniques from leading Oracle security experts This Oracle Press guide demonstrates practical applications of the most compelling methods for developing
630 0 0 _aOracle (Computer file)
_9966
650 0 _aComputer security.
_91751
650 0 _aDatabases.
_91752
650 0 _aDatabase security.
_9989
700 1 _aKnox, David C. ... [et al.]
_q(David C.)
_91753
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBOOK
999 _c36791
_d36790