Oracle Database 12c Security

by ; ;
  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: Paperback
  • Copyright: 1/5/2015
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $70.00 Save up to $24.50
  • Rent Book $45.50
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.

  • Connect users to databases in a secure manner
  • Manage identity, authentication, and access control
  • Implement database application security
  • Provide security policies across enterprise applications using Real Application Security
  • Control data access with Oracle Virtual Private Database
  • Control sensitive data using data redaction and transparent sensitive data protection
  • Control data access with Oracle Label Security
  • Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
  • Implement auditing technologies, including Unified Audit Trail
  • Manage security policies and monitor a secure database environment with Oracle Enterprise Manager Cloud Control

Table of Contents

1) Database Vault for privileged users/objects/commands 2) Separation of Duties3) Virtual Private Database for row/column/cell security4) Label based access control5) Secure Application Context 6) Sensitive data discovery7) Least privilege analysis8) Multi-factor auditing and redaction9) Real Application Security10) Code-based access control (CBAC) associates privileges with code11) Transparent Sensitive Data Protection associates policies with sensitive columns

Rewards Program

Write a Review