Oracle Security Handbook
This text teaches readers the why and how of implementing security plans in an Oracle environment. It proceeds logically through the necessary steps, which include: understanding Oracle's security architecture and implementing a plan; securing and interacting with OS's - Windows NT/2000, UNIX, and Linux; securing the database - with concrete examples; securing the network - with coverage of Web site and Oracle Portal security; and protecting against hackers, auditing and troubleshooting. Supplemental information including a glossary of terms, security risk assessment review, a hands-on tutorial to securing a server, and new security features for Oracle9i is also included.
Try this search over all volumes: first "sql injection"
Results 1-0 of 0
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Evolution of Security
Enter the Computer
Know Your Threats
198 other sections not shown
access control algorithm allow application attack audit trail authentication backup buffer overflow certificate client command configuration file connect content area create database administrator database user default delete domain Edit employee encryption ensure example execute firewall function hacker implementation inetd installation Internet IP address LDAP listener Login Server look Manager middle tier modify Net8 objects operating system option Oracle Corporation Oracle database Oracle Internet Directory Oracle Portal Oracle software Oracle's Oracle8i package packet parameter password hashes perform permissions PL/SQL port portlet privileges problem procedures protocol public key query role schema script security policy Single Sign-On someone specific SQL*Plus stored SYSDBA trigger Unix update user account user's username and password web server Windows NT