Sunday, December 6, 2009

Applied Oracle Security: Developing Secure Database and Middleware Environments

David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise, "Applied Oracle Security: Developing Secure Database and Middleware Environments"
McGraw-Hill Osborne Media | 2009 | ISBN: 0071613706 | 640 pages | PDF | 5,8 MB

Cutting-edge techniques from leading Oracle security experts

This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications.

Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today's IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.

Part I: Oracle Database Security New Features;
Chapter 1. Security Blueprints and New Thinking;
Chapter 2. Transparent Data Encryption;
Chapter 3. Applied Auditing and Audit Vault;

Part II: Oracle Database Vault;
Chapter 4. Database Vault Introduction;
Chapter 5. Database Vault Fundamentals;
Chapter 6. Applied Database Vault for Custom Applications;
Chapter 7. Applied Database Vault for Existing Applications;

Part III: Identity Management;
Chapter 8. Architecting Identity Management;
Chapter 9. Oracle Identity Manager;
Chapter 10. Oracle Directory Services;

Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence;
Chapter 11. Web-centric Security in APEX;
Chapter 12. Secure Coding Practices in APEX;
Chapter 13. Securing Access to Oracle BI;
Chapter 14. Securing Oracle BI Content and Data;

Appendix A. Using the Oracle BI Examples;



If you need any other e-book, video tutorial or software project then just post the request in the comments section.


Post a Comment | Feed

Post a Comment

Related Posts with Thumbnails

Blog Archive

Lattest Posts

Earn Money

  © Free E-Books U ask v provide by Free E-Books Download 2009

Disclaimer: This blog does not store any files on its server.We only index and link to content provided by sites. HACKING TUTORIALS ARE JUST FOR EDUCATIONAL PURPOSES. PLEASE DON"T MISUSE THEM!

USER AGREEMENT PLEASE READ : The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These links here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. If you want to remove links to your website. Please send an email at vikasadsenceaccount3[at]gmail[dot]com