Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

Available items only
Record 28 of 44
Previous Record Next Record
Author Wright, Paul M. (Computer scientist), author.

Title Protecting Oracle Database 12c / Paul Wright.

Publication Info. Berkeley, CA : Apress, 2014.
New York, NY : Distributed to the Book trade worldwide by Springer


Location Call No. OPAC Message Status
 Axe Books 24x7 IT E-Book  Electronic Book    ---  Available
Description 1 online resource (xviii, 292 pages) : illustrations.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Series The expert's voice in Oracle
Expert's voice in Oracle.
Note Includes index.
Summary Protecting Oracle Database 12c shows how to secure Oracle Databases, especially when deploying the new consolidation features of Oracle's cloud feature set.
Note Online resource; title from PDF title page (SpringerLink, viewed April 21, 2014).
Contents At a Glance; Part1: Security Overview and History; Chapter 1: Oracle Security History; Chapter 2: Current State of the Art; Google Hacking tnsnames.ora; Attacking without tnsnames.ora; Attacking the Standby Database; Attacking the Backups; Brute Force Remotely Over the Network; Attacking the SYS Account; TNS Poison Proxy Attack; Privilege Escalation; Database Link Security; Chapter 3: Extrapolating Current Trends; GPU -Supported Password Cracking; Strong Password Philosophy; Raising the Decryption Bar; Moving to the Cloud; Ensuring Replication Security; General Trends.
Into the FuturePart 2:Defense Cookbook; Chapter 4: Managing Users in Oracle; User Management Limitations; Controlling System Privilege Usage by Wrapping; Wrapping Alter User; Grant Schema Wide; Time-based Privileges; Listing and Assigning Privileges to Users; Bypassing User Management Controls; Access to User Password Information; LAST_LOGIN; Chapter 5: Oracle Vulnerability Scanning; Retrospective; Tools of the Trade; Penetration Testing; Reviewing the Results; Additional Protection; Permissions; Chapter 6: Centralized Native Auditing and IPS; The Unified Audit Trail; A Centralized Syslog.
Management and ReportingSearching the Audit Trail; Ongoing Maintenance; Alerting to Syslog Content; Native Intrusion Prevention; Chapter 7: Pluggable Database Primer; Reasons for Pluggable Databases; Simple View of 12c Container Structure; Understanding Users and Roles in 12c; Creating Common Roles; Switching Containers; Cloning the Seed Database; Pluggable DB Commands; Upgrading to 12c Multi-tenancy; Part3: Security in the 12c Release; Chapter 8: New Security Features in 12C; Data Redaction; Database Auditing; Context of the Changes to Audit Trail in 12c; Actual 12c Release Audit Trail.
Privilege AnalysisTransparent Sensitive-Data Protection; Transparent Data Encryption; Database Vault; Database Application Security Architecture; Definer's Roles; SELECT ANY DICTIONARY Privilege; Breaking Up SYSDBA Privilege; 12c Miscellaneous Security Improvements; Security Features Not in 12c; Chapter 9: Design Flaws, Fixed and Remaining in 12C; Remote SYS Brute-Force Attacks; Default Account Attacks; Privilege Escalation through Public Privileges; Public Privileges; Definer's Roles; SYSDBA Phishing; Database Link Issues; Passwords; OS Access from the DB; Privilege Escalation to SYSDBA.
Privilege ExtensionChapter 10: Security Issues in 12c; Segregated Groups of User Privilege; DBMS_ADVISOR Directory Privileges; GRANT ANY OBJECT PRIVILEGE Control Bypass; Redaction Bypasses; 12c Passwords and Cryptography; DBlink Decryption in 12c; Network Authentication Decryption in 12c; Phishing for SYSDBA; Chapter 11: Advanced Defense and Forensic Response; Controlling the PUBLIC Role; State-Checking Query; OS Checksum Automation; Securing the DB from the OS; Controlling Database Link Permissions; Enterprise Manager and Cloud Control Security; Oracle Forensics; History of Oracle Forensics.
Subject Oracle (Computer file)
Oracle (Computer file) (OCoLC)fst01363816
Database security.
Data encryption (Computer science)
Database management.
COMPUTERS -- Databases -- General.
Data encryption (Computer science) (OCoLC)fst00887935
Database management. (OCoLC)fst00888037
Database security. (OCoLC)fst00888063
Computer Science.
Database Management.
Data Encryption.
Genre/Form Electronic books.
Other Form: Print version: 9781430262114
ISBN 9781430262121 (electronic bk.)
1430262125 (electronic bk.)
Standard No. 10.1007/978-1-4302-6212-1 doi
AU@ 000053310633
DEBBG BV042990008
DEBSZ 427420652
NZ1 15579440

Available items only