000 | 02200cam a2200325 a 4500 | ||
---|---|---|---|
001 | 15919162 | ||
005 | 20240318183500.0 | ||
008 | 090923s2010 nyua 001 0 eng | ||
010 | _a 2009037612 | ||
020 | _a9780071613705 (alk. paper) | ||
020 | _a0071613706 (alk. paper) | ||
035 | _a(OCoLC)ocn233549691 | ||
040 |
_aDLC _cDLC _dABK _eRDA |
||
050 | 0 | 0 |
_aQA76.9.A25 _bA67 2010 |
082 | 0 | 0 |
_222 _a005.8 _bAPP |
245 | 0 | 0 |
_aApplied Oracle security : _bdeveloping secure database and middleware environments / _cDavid C. Knox ... [et al.]. |
260 |
_aNew York : _bMcGraw-Hill, _cc2010. |
||
300 |
_axxv, 610 pages : _billustration; _c23 cm. |
||
500 | _aIncludes index. | ||
505 | _aPart I: Oracle Database Security New Features; Chapter 1. Security Blueprints and New Thinking; Chapter 2. Transparent Data Encryption; Chapter 3. Applied Auditing and Audit Vault; Part II: Oracle Database Vault; Chapter 4. Database Vault Introduction; Chapter 5. Database Vault Fundamentals; Chapter 6. Applied Database Vault for Custom Applications; Chapter 7. Applied Database Vault for Existing Applications; Part III: Identity Management; Chapter 8. Architecting Identity Management; Chapter 9. Oracle Identity Manager; Chapter 10. Oracle Directory Services; Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence; Chapter 11. Web-centric Security in APEX; Chapter 12. Secure Coding Practices in APEX; Chapter 13. Securing Access to Oracle BI; Chapter 14. Securing Oracle BI Content and Data; Appendix A. Using the Oracle BI Examples; Index | ||
520 | _aCutting-edge techniques from leading Oracle security experts This Oracle Press guide demonstrates practical applications of the most compelling methods for developing | ||
630 | 0 | 0 |
_aOracle (Computer file) _9966 |
650 | 0 |
_aComputer security. _91751 |
|
650 | 0 |
_aDatabases. _91752 |
|
650 | 0 |
_aDatabase security. _9989 |
|
700 | 1 |
_aKnox, David C. ... [et al.] _q(David C.) _91753 |
|
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBOOK |
||
999 |
_c36791 _d36790 |