Oracle 11g Anti-Hacker's Cookbook

Author: Adrian Neagu

Publisher: Packt Publishing Ltd

ISBN:

Category: Computers

Page: 302

View: 654

This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts.

Oracle Database 12c Security Cookbook

Author: Zoran Pavlovic

Publisher: Packt Publishing Ltd

ISBN:

Category: Computers

Page: 388

View: 619

Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data About This Book Explore and learn the new security features introduced in Oracle Database 12c, to successfully secure your sensitive data Learn how to identify which security strategy is right for your needs – and how to apply it Each 'recipe' provides you with a single step-by-step solution, making this book a vital resource, delivering Oracle support in one accessible place Who This Book Is For This book is for DBAs, developers, and architects who are keen to know more about security in Oracle Database 12c. This book is best suited for beginners and intermediate-level database security practitioners. Basic knowledge of Oracle Database is expected, but no prior experience of securing a database is required. What You Will Learn Analyze application privileges and reduce the attack surface Reduce the risk of data exposure by using Oracle Data Redaction and Virtual Private Database Control data access and integrity in your organization using the appropriate database feature or option Learn how to protect your databases against application bypasses Audit user activity using the new auditing architecture Restrict highly privileged users from accessing data Encrypt data in Oracle Database Work in a real-world environment where a multi-layer security strategy is applied In Detail Businesses around the world are paying much greater attention toward database security than they ever have before. Not only does the current regulatory environment require tight security, particularly when dealing with sensitive and personal data, data is also arguably a company's most valuable asset - why wouldn't you want to protect it in a secure and reliable database? Oracle Database lets you do exactly that. It's why it is one of the world's leading databases – with a rich portfolio of features to protect data from contemporary vulnerabilities, it's the go-to database for many organizations. Oracle Database 12c Security Cookbook helps DBAs, developers, and architects to better understand database security challenges. Let it guide you through the process of implementing appropriate security mechanisms, helping you to ensure you are taking proactive steps to keep your data safe. Featuring solutions for common security problems in the new Oracle Database 12c, with this book you can be confident about securing your database from a range of different threats and problems. Style and approach Each chapter explains the different aspects of security through a series of recipes. Each recipe presents instructions in a step-by-step manner, supported by explanations of the topic.

Web Hacking

Attacks and Defense

Author: Stuart McClure

Publisher: Addison-Wesley Professional

ISBN:

Category: Computers

Page: 492

View: 719

The Presidentâe(tm)s life is in danger! Jimmy Sniffles, with the help of a new invention, shrinks down to miniature size to sniff out the source of the problem.

Steal this Computer Book 3

What They Won't Tell You about the Internet

Author: Wally Wang

Publisher:

ISBN:

Category: Computers

Page: 359

View: 760

Describes how computer viruses are created and spread, and discusses computer harassment, online con artists, protecting data with encryption, and general computer security issues.

IT Auditing Using Controls to Protect Information Assets, Third Edition

Author: Mike Kegerreis

Publisher: McGraw Hill Professional

ISBN:

Category: Computers

Page: 576

View: 381

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. • Build and maintain an internal IT audit function with maximum effectiveness and value • Audit entity-level controls and cybersecurity programs • Assess data centers and disaster recovery • Examine switches, routers, and firewalls • Evaluate Windows, UNIX, and Linux operating systems • Audit Web servers and applications • Analyze databases and storage solutions • Review big data and data repositories • Assess end user computer devices, including PCs and mobile devices • Audit virtualized environments • Evaluate risks associated with cloud computing and outsourced operations • Drill down into applications and projects to find potential control weaknesses • Learn best practices for auditing new technologies • Use standards and frameworks, such as COBIT, ITIL, and ISO • Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI • Implement proven risk management practices

The Pipe

The Art and Lore of a Great Tradition

Author: Robin Crole

Publisher: Prima Lifestyles

ISBN:

Category: Social Science

Page: 144

View: 198

Traces the history of pipe smoking from the earliest use of tobacco by Europeans on the newly-explored American continent to the present, and describes the manufacture of pipes and the preparation of tobacco for smoking

Fortune

Author:

Publisher:

ISBN:

Category: Business

Page:

View: 552