Oracle Security
Books / Paperback
Books › Computers › Security › General
ISBN: 1565924509 / Publisher: O'Reilly Media, October 1998
This unique book extensively discusses basic RDBMS security features, such as system file and password protection, database table and field access control, and the use of audit trails and backup and recovery strategies. It also offers many practical strategies for securing an Oracle system and touches on advanced security features.
Read More
Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases.Oracle security has many facets:Establishing an organization's security policy and planProtecting system files and passwordsControlling access to database objects (tables, views, rows, columns, etc.)Building appropriate user profiles, roles, and privilegesMonitoring system access via audit trailsOracle Security describes how these basic database security features are implemented and provides many practical strategies for securing Oracle systems and databases. It explains how to use the Oracle Enterprise Manager and Oracle Security Server to enhance your site's security, and it touches on such advanced security features as encryption, Trusted Oracle, and various Internet and World Wide Web protection strategies.A table of contents follows:Preface Part I: Security in an Oracle SystemOracle and Security Oracle System Files Oracle Database Objects The Oracle Data Dictionary Default Roles and User Accounts Profiles, Passwords, and SynonymsPart II: Implementing SecurityDeveloping a Database Security Plan Installing and Starting Oracle Developing a Simple Security Application Developing an Audit Plan Developing a Sample Audit Application Backing Up and Recovering a Database Using the Oracle Enterprise Manager Maintaining User AccountsPart III: Enhanced Oracle SecurityUsing the Oracle Security Server Using the Internet and the Web Using Extra-Cost OptionsAppendix A. References
Read Less