Read more
Informationen zum Autor Ron Ben-Natan Klappentext This guide demonstrates how to secure sensitive data and comply with internal and eternal audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that should be taken to enable, configure, or administer security-related features. It includes best practices in securing Oracle and on Oracle security options and products. By providing specific instructions and examples this book bridges the gap between the individuals who install and configure a security feature and those who secure and audit it. Zusammenfassung Demonstrates how to secure sensitive data and comply with internal and eternal audit regulations using Oracle 10g and 11g. This work offers guidance to understand the complex options provided by Oracle and the know-how to choose the best option for a case. It includes best practices in securing Oracle and on Oracle security options and products. Inhaltsverzeichnis Introduction Hardening Oracle 10g and 11g Securing the Listener Account Security Oracle Wallet and PKI Authentication Encrypting of Data-in-Transit and Message Integrity Encrypting Data-at-Rest Standard Auditing Administrator Auditing Fine Grained Auditing (FGA) Change Auditing and Before/After Values Oracle Audit Vault Audit Architectures and Best Practices Authorization Virtual Private Database Oracle Database Vault