官术网_书友最值得收藏!

What this book covers

Chapter 1, Basic Database Security, introduces you to the different authentication methods supported by Oracle Database 12c and also provides a brief overview about creating and using database roles.

Chapter 2, Security Considerations in Multitenant Environment, focuses on some of the security considerations concerning common and local: users, roles, and privileges.

Chapter 3, PL/SQL Security, helps you understand the differences and usages of definer and invoker rights procedures as well as usages of code-based access control. It gives required information about authorization.

Chapter 4, Virtual Private Database, introduces you to the Oracle Virtual Private Database, which is a security feature introduced in Oracle Database 8i, which enables you to have a more granular control over security of your data.

Chapter 5, Data Redaction, introduces you to the new security feature Oracle Data Redaction, which helps you mask (hide/redact) some (sensitive) data from end users in a production environment.

Chapter 6, Transparent Sensitive Data Protection, teaches you ways to create classes of sensitive data and helps you gain more centralized control over how sensitive data is protected.

Chapter 7, Privilege Analysis, it shows how to create and enable privilege analysis policies. It also covers how to generate reports and revoke both used and unused Object/System privileges.

Chapter 8, Transparent Data Encryption, explains key concepts and tasks such as: two-key architecture, key management, message authentication code (MAC), salt, encrypting columns in a table, encrypting a tablespace, creating an encrypted RMAN backup, and so on.

Chapter 9, Database Vault, covers basic concepts of Oracle Database Vault. It teaches you how to create and appropriately use realms, rules, rule sets, command rules, factors, and secure application roles.

Chapter 10, Unified Auditing, introduces a new auditing architecture.

Chapter 11, Additional Topics, covers more advanced topics and teaches you how to perform everyday administration tasks in Database Vault environment.

Chapter 12Appendix - Application Contexts, will cover how to retrieve values from built-in contexts and to create, set, and use an application context.

主站蜘蛛池模板: 宁阳县| 淮阳县| 邹平县| 潜山县| 汕尾市| 桃园县| 电白县| 安龙县| 普兰县| 额敏县| 阿城市| 三河市| 七台河市| 县级市| 安徽省| 庆云县| 苏尼特左旗| 东辽县| 营口市| 玛多县| 洪泽县| 叶城县| 永川市| 都昌县| 许昌市| 汉中市| 乌兰浩特市| 阿坝县| 新乡市| 岫岩| 曲阜市| 台北县| 丹巴县| 正安县| 牟定县| 怀仁县| 醴陵市| 蓬莱市| 龙里县| 崇仁县| 方城县|