Oracle security handbook
From the official Oracle Press comes a comprehensive guide to implementing a sound security plan in your Oracle environment. This expert resource explains how to secure the operating system, the database, and the network and how to use Oracle's built-in security features. The book also explains how to hacker-proof, audit, and troubleshoot your entire system.
2 pages matching first "sql injection" in this book
Results 1-2 of 2
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Evolution of Security
Enter the Computer
Know Your Threats
198 other sections not shown
access control algorithm allow application attack audit trail authentication backup buffer overflow certificate client command configuration file connect content area create database administrator database user default delete domain Edit employee encryption ensure example execute firewall function hacker implementation inetd installation Internet IP address LDAP listener Login Server look Manager middle tier modify Net8 objects operating system option Oracle Corporation Oracle database Oracle Internet Directory Oracle Portal Oracle software Oracle's Oracle8i package packet parameter password hashes perform permissions PL/SQL port portlet privileges problem procedures protocol public key query role schema script security policy Single Sign-On someone specific SQL*Plus stored SYSDBA trigger Unix update user account user's username and password web server Windows NT