官术网_书友最值得收藏!

What this book covers

Chapter 1, Basic Database Security, introduces you to the different authentication methods supported by Oracle Database 12c and also provides a brief overview about creating and using database roles.

Chapter 2, Security Considerations in Multitenant Environment, focuses on some of the security considerations concerning common and local: users, roles, and privileges.

Chapter 3, PL/SQL Security, helps you understand the differences and usages of definer and invoker rights procedures as well as usages of code-based access control. It gives required information about authorization.

Chapter 4, Virtual Private Database, introduces you to the Oracle Virtual Private Database, which is a security feature introduced in Oracle Database 8i, which enables you to have a more granular control over security of your data.

Chapter 5, Data Redaction, introduces you to the new security feature Oracle Data Redaction, which helps you mask (hide/redact) some (sensitive) data from end users in a production environment.

Chapter 6, Transparent Sensitive Data Protection, teaches you ways to create classes of sensitive data and helps you gain more centralized control over how sensitive data is protected.

Chapter 7, Privilege Analysis, it shows how to create and enable privilege analysis policies. It also covers how to generate reports and revoke both used and unused Object/System privileges.

Chapter 8, Transparent Data Encryption, explains key concepts and tasks such as: two-key architecture, key management, message authentication code (MAC), salt, encrypting columns in a table, encrypting a tablespace, creating an encrypted RMAN backup, and so on.

Chapter 9, Database Vault, covers basic concepts of Oracle Database Vault. It teaches you how to create and appropriately use realms, rules, rule sets, command rules, factors, and secure application roles.

Chapter 10, Unified Auditing, introduces a new auditing architecture.

Chapter 11, Additional Topics, covers more advanced topics and teaches you how to perform everyday administration tasks in Database Vault environment.

Chapter 12Appendix - Application Contexts, will cover how to retrieve values from built-in contexts and to create, set, and use an application context.

主站蜘蛛池模板: 宜城市| 延津县| 富平县| 吉林市| 台安县| 泸溪县| 芮城县| 应城市| 民和| 皮山县| 丰县| 澄江县| 偏关县| 高青县| 惠水县| 赣州市| 高要市| 千阳县| 屏东县| 浑源县| 尉氏县| 冕宁县| 咸丰县| 蓝田县| 宜川县| 天全县| 澄江县| 泾川县| 格尔木市| 收藏| 宜丰县| 平潭县| 磐安县| 咸宁市| 额济纳旗| 寻甸| 尼木县| 友谊县| 新晃| 资兴市| 卓资县|