Oracle Database 12c Security
- Length: 560 pages
- Edition: 1
- Language: English
- Publisher: McGraw-Hill Osborne Media
- Publication Date: 2015-01-09
- ISBN-10: 0071824286
- ISBN-13: 9780071824286
- Sales Rank: #1272177 (See Top 100 Books)
Best Practices for Comprehensive Oracle Database Security
Written by renowned experts from Oracle’s National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.
- Connect users to databases in a secure manner
- Manage identity, authentication, and access control
- Implement database application security
- Provide security policies across enterprise applications using Real Application Security
- Control data access with Oracle Virtual Private Database
- Control sensitive data using data redaction and transparent sensitive data protection
- Control data access with Oracle Label Security
- Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
- Implement auditing technologies, including Unified Audit Trail
- Manage security policies and monitor a secure database environment with Oracle Enterprise Manager Cloud Control
Table of Contents
PART I Essential Database Security
Chapter 1. Security for Today’s World
Chapter 2. Essential Elements of User Security
Chapter 3. Connection Pools and Enterprise Users
Chapter 4. Foundational Elements for a Secure Database
Chapter 5. Foundational Elements of Database Application Security
Chapter 6. Real Application Security
PART II Advanced Database Security
Chapter 7. Controlled Data Access with Virtual Private Database
Chapter 8. Essential Elements of Sensitive Data Control
Chapter 9. Access Controls with Oracle Label Security
Chapter 10. Oracle Database Vault: Securing for the Compliance Regulations, Cybersecurity, and Insider Threats
Chapter 11. Oracle Transparent Data Encryption: Securing for the Compliance Regulations, Cybersecurity, and Insider Threats
PART III Security and Auditing for the Cloud
Chapter 12. Audit for Accountability
Chapter 13. An Applied Approach to Multitenancy and Cloud Security
Appendix A Sample Preparation Scripts