Books & Videos

Table of Contents

  1. Security in an oracle System

    1. Chapter 1 Oracle and Security

      1. What’s It All About?
      2. The Oracle Security Model
      3. Procedures, Policies, and Plans
      4. If I Had a Hammer...
    2. Chapter 2 Oracle System Files

      1. What’s in the Files?
      2. The Instance and the Database: Starting an Oracle Database
      3. Types of Database Files
    3. Chapter 3 Oracle Database Objects

      1. The User Interface: User Versus Schema
      2. Objects
      3. Tables
      4. Table Triggers
      5. Views
      6. Stored Programs
      7. Synonyms
      8. Privileges
      9. Roles
      10. Profiles
    4. Chapter 4 The Oracle Data Dictionary

      1. Creating and Maintaining the Data Dictionary
      2. The Data Dictionary Views
      3. About SQL.BSQ
      4. Views Used for Security
      5. The Composition of the Views
    5. Chapter 5 Oracle Default Roles and User Accounts

      1. About the Defaults
      2. The CONNECT Role
      3. The RESOURCE Role
      4. The DBA Role
      5. The SYSDBA and SYSOPER Roles
      6. Using the Default Roles
      7. Default User Accounts
      8. Segmenting Authority in the Database
    6. Chapter 6 Profiles, Passwords, and Synonyms

      1. Profiles
      2. Passwords
      3. Synonyms
  2. Implementing Security

    1. Chapter 7 Developing a Database Security Plan

      1. About the Security Policy and Security Plan
      2. Types of Accounts
      3. Standards for Accounts
      4. Standards for Usernames
      5. Standards for Passwords
      6. Standards for Roles
      7. Standards for Views
      8. Standards for the Oracle Security Server
      9. Standards for Employees
      10. Sample Security Plan Index
      11. Sample Security Plan Checklist
    2. Chapter 8 Installing and Starting Oracle

      1. Segmenting Application Processing
      2. Installing Oracle Securely
      3. Connecting to the Database Without a Password
      4. Installing and Configuring SQL*Net
      5. Setting Up Initialization Parameters for Security
    3. Chapter 9 Developing a Simple Security Application

      1. The Application Overview
      2. Preparing the Role-Object Matrix
      3. Views
      4. Roles
      5. Grants
      6. Application Control of Access
    4. Chapter 10 Developing an Audit Plan

      1. Why Audit?
      2. Where to Audit
      3. How Auditing Works
      4. Auditing and Performance
      5. Default Auditing
      6. Types of Auditing
      7. Purging Audit Information
    5. Chapter 11 Developing a Sample Audit Application

      1. About the Audit Trail Application
      2. About Performance and Storage
      3. Using the Audit Data in Reports
      4. SQL Scripts to Generate Scripts
    6. Chapter 12 Backing Up and Recovering the Database

      1. What Are the Backup Options?
      2. What’s New for Oracle8?
      3. What Are the Recovery Options?
    7. Chapter 13 Using the Oracle Enterprise Manager

      1. What Is the OEM?
      2. The DBA Toolkit and Security
      3. OEM and the Job Scheduler
      4. OEM and the Event Management System
    8. Chapter 14 Maintaining User Accounts

      1. Application Design Requirements
      2. Running the Application
      3. Documenting the User State
      4. A Sample Script
  3. Enhanced Oracle Security

    1. Chapter 15 Using the Oracle Security Server

      1. About Cryptography
      2. Ways to Authenticate Users
      3. What’s in the OSS?
      4. Configuring and Using the OSS
    2. Chapter 16 Using the Internet and the Web

      1. Web Basics
      2. Evaluating Web Assets and Risks
      3. Protecting a Web Site
      4. Getting Users Involved
    3. Chapter 17 Using Extra-Cost Options

      1. Trusted Oracle
      2. Advanced Networking Option
      3. Oracle Application Server
    4. Appendix References

      1. Oracle Books
      2. Security Books
      3. Oracle Electronic References
      4. Security Electronic References
  1. Colophon