Libros > Applied Oracle Security: Developing Secure Database and Middleware Environments : Developing Secure Database and Middleware Environments (Ebook)
Portada de Applied Oracle Security: Developing Secure Database and Middleware Environments : Developing Secure Database and Middleware Environments (ebook)

Applied Oracle Security: Developing Secure Database and Middleware Environments : Developing Secure Database and Middleware Environments (ebook)

Autores:Knox, David; Gaetjen, Scott; Jahangir, Hamza; Muth, Tyler; Sack, Patrick; Wark, Richard; Wise, Bryan; VV.AA.;
Categoría:
ISBN: EB9780071613705
McGraw-Hill Digital nos ofrece Applied Oracle Security: Developing Secure Database and Middleware Environments : Developing Secure Database and Middleware Environments (ebook) en inglés, disponible en nuestra tienda desde el 01 de Enero del 2011. Este libro cuenta con un total de 497 páginas .
Leer argumento »
Ver todas las novedades de libros »

Argumento de Applied Oracle Security: Developing Secure Database and Middleware Environments : Developing Secure Database and Middleware Environments (ebook)

Cutting-edge techniques from leading Oracle security experts

This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications.

Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today's IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.0Part I: Oracle Database Security New Features; Chapter 1. Security Blueprints and New Thinking; Chapter 2. Transparent Data Encryption; Chapter 3. Applied Auditing and Audit Vault; Part II: Oracle Database Vault; Chapter 4. Database Vault Introduction; Chapter 5. Database Vault Fundamentals; Chapter 6. Applied Database Vault for Custom Applications; Chapter 7. Applied Database Vault for Existing Applications; Part III: Identity Management; Chapter 8. Architecting Identity Management; Chapter 9. Oracle Identity Manager; Chapter 10. Oracle Directory Services; Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence; Chapter 11. Web-centric Security in APEX; Chapter 12. Secure Coding Practices in APEX; Chapter 13. Securing Access to Oracle BI; Chapter 14. Securing Oracle BI Content and Data; Appendix A. Using the Oracle BI Examples; Index

Ultimacomic es una marca registrada por Ultimagame S.L - Ultimacomic.com y Ultimagame.com pertenecen a la empresa Ultimagame S.L - Datos Fiscales: B92641216 - Datos de Inscripción Registral: Inscrita en el Registro Mercantíl de Málaga, TOMO: 3815. LIBRO: 2726. FOLIO: 180. HOJA: MA-77524.
2003 - 2019, COPYRIGHT ULTIMAGAME S.L. - Leer esta página significa estar deacuerdo con la Política de privacidad y de uso