
Download App
ISBN
:
9788173660719
Publisher
:
Shroff/o'reilly
Subject
:
Others
Binding
:
Paperback
Pages
:
448
Year
:
1998
₹
75.0
₹
73.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases. Oracle security has many facets:Establishing an organization's security policy and plan Protecting system files and passwords Building appropriate user profiles, roles, and privileges Monitoring system access via audit trailsControlling access to database objects (tables, views, rows, columns, etc.)Oracle Security describes how these basic database security features are implemented and provides many practical strategies for securing Oracle systems and databases. It explains how to use the Oracle Enterprise Manager and Oracle Security Server to enhance your site's security, and it touches on such advanced security features as encryption, Trusted Oracle, and various Internet and World Wide Web protection strategies. A table of contents follows: Preface Part I: Security in an Oracle System Oracle and Security Oracle System Files Oracle Database Objects The Oracle Data Dictionary Default Roles and User Accounts Profiles, Passwords, and SynonymsPart II: Implementing Security Developing a Database Security Plan Installing and Starting Oracle Developing a Simple Security Application Developing an Audit Plan Developing a Sample Audit Application Backing Up and Recovering a Database Using the Oracle Enterprise Manager Maintaining UserAccounts Part III: Enhanced Oracle Security Using the Oracle Security Server Using the Internet and the Web Using Extra-Cost Options
Author Biography
William Heney started working with version 2 of the Oracle database in 1980. After doing application development in FORTRAN and what then passed for 'Forms,' he began to specialize in DBA work. In the ensuing years he has worked for a wide variety of customers, many of whom wanted some form of access control implemented in the database. Some of the techniques acquired during these experiences are reflected in this book. Marlene Theriault
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 2 Items
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary