Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
E-book details
Log in, If you're interested in the contents of the item.
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
Ebook
For almost all organizations, data security is a matter of prestige and credibility. The Oracle Database is one of the most rich in features and probably the most used Database in a variety of industries where security is essential. To ensure security of data both in transit and on the disk, Oracle has implemented the security technologies to achieve a reliable and solid system. In Oracle 11g Anti-Hacker's Cookbook, you will learn about the most important solutions that can be used for better database security.Oracle 11g Anti-hacker's Cookbook covers all the important security measures and includes various tips and tricks to protect your Oracle Database.Oracle 11g Anti-hacker's Cookbook uses real-world scenarios to show you how to secure the Oracle Database server from different perspectives and against different attack scenarios. Almost every chapter has a possible threads section, which describes the major dangers that can be confronted. The initial chapters cover how to defend the operating system, the network, the data and the users. The defense scenarios are linked and designed to prevent these attacks. The later chapters cover Oracle Vault, Oracle VPD, Oracle Labels, and Oracle Audit. Finally, in the Appendices, the book demonstrates how to perform a security assessment against the operating system and the database, and how to use a DAM tool for monitoring.
- Oracle 11g Anti-hackers Cookbook
- Table of Contents
- Oracle 11g Anti-hacker's Cookbook
- Credits
- Foreword
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Instant Updates on New Packt Books
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Errata
- Piracy
- Questions
- 1. Operating System Security
- Introduction
- Using Tripwire for file integrity checking
- Getting ready
- How to do it...
- How it works...
- There's more...
- Other administrative options
- Using immutable files to prevent modifications
- Getting ready
- How to do it...
- How it works...
- There's more...
- Closing vulnerable network ports and services
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using network security kernel tunables to protect your system
- How to do it...
- How it works...
- There's more...
- Using TCP wrappers to allow and deny remote connections
- Getting ready
- How to do it...
- How it works...
- There is more...
- Enforcing the use of strong passwords and restricting the use of previous passwords
- Getting ready
- How to do it...
- How it works...
- There is more...
- Performing a security assessment on current passwords with the John the Ripper password cracker tool
- Restricting direct login and su access
- Getting ready
- How to do it...
- How it works...
- There's more...
- Securing SSH login
- Getting ready
- How to do it...
- How it works...
- There's more...
- Setting up public key authentication
- 2. Securing the Network and Data in Transit
- Introduction
- Hijacking an Oracle connection
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also...
- Using OAS network encryption for securing data in motion
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using OAS data integrity for securing data in motion
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using OAS SSL network encryption for securing data in motion
- Getting ready
- How to do it...
- How it works...
- There's more...
- Encrypting network communication using IPSEC
- Getting ready
- How it works...
- How it works...
- There's more...
- Encrypting network communication with stunnel
- Getting ready
- How to do it...
- How it works...
- There's more...
- Encrypting network communication using SSH tunneling
- Getting ready
- How to do it...
- How it works...
- There's more...
- Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER parameter
- Getting ready
- How to do it...
- How it works...
- There's more...
- Securing external program execution (EXTPROC)
- Getting ready
- How to do it...
- How it works...
- There's more...
- See Also
- Controlling client connections using the TCP.VALIDNODE_CHECKING listener parameter
- Getting ready
- How to do it...
- How it works...
- There's more...
- 3. Securing Data at Rest
- Introduction
- Using block device encryption
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using filesystem encryption with eCryptfs
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using DBMS_CRYPTO for column encryption
- Getting Ready
- How to do it...
- How it works...
- There's more...
- Using Transparent Data Encryption for column encryption
- Getting ready
- How to do it...
- How it works...
- There's more...
- Performance implications
- Limitations:
- Recommendations
- See also
- Using TDE for tablespace encryption
- Getting ready
- How to do it...
- How it works...
- There's more...
- Encryption key management
- Using encryption with data pump
- Getting ready
- How to do it...
- How it works...
- Using encryption with RMAN
- Getting ready
- How to do it...
- How it works...
- There's more...
- 4. Authentication and User Security
- Introduction
- Performing a security evaluation using Oracle Enterprise Manager
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using an offline Oracle password cracker
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using user profiles to enforce password policies
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using secure application roles
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- How to perform authentication using external password stores
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using SSL authentication
- Getting ready
- How to do it...
- How it works...
- There's more...
- 5. Beyond Privileges: Oracle Virtual Private Database
- Introduction
- Using session-based application contexts
- Getting ready
- How to do it...
- How it works...
- There's more...
- Implementing row-level access policies
- Getting ready
- How to do it...
- How it works...
- There's more...
- Performance implications
- Using Oracle Enterprise Manager for managing VPD
- Getting ready
- How to do it...
- How it works...
- Implementing column-level access policies
- Getting ready
- How to do it...
- How it works...
- Implementing VPD grouped policies
- Getting ready
- How to do it...
- How it works...
- There's more...
- Granting exemptions from VPD policies
- How to do it...
- How it works...
- There's more...
- 6. Beyond Privileges: Oracle Label Security
- Introduction
- Creating and using label components
- Getting ready
- How to do it...
- How it works...
- There's more...
- Defining and using compartments and groups
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using label policy privileges
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using trusted stored units
- Getting ready
- How to do it...
- How it works...
- There's more...
- 7. Beyond Privileges: Oracle Database Vault
- Introduction
- Creating and using Oracle Database Vault realms
- Getting ready
- How to do it...
- How it works...
- There's more...
- Creating and using Oracle Vault command rules
- Getting ready
- How to do it...
- How it works...
- There's more...
- Creating and using Oracle Database Vault rulesets
- Getting ready
- How to do it...
- How it works...
- There's more...
- Creating and using Oracle Database Vault factors
- Getting ready
- How to do it...
- How it works...
- There's more...
- Creating and using Oracle Database Vault reports
- Getting ready
- How to do it...
- How it works...
- There's more...
- 8. Tracking and Analysis: Database Auditing
- Introduction
- Determining how and where to generate audit information
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Auditing sessions
- Getting ready
- How to do it...
- How it works...
- There's more...
- Auditing statements
- Getting ready
- How to do it...
- How it works...
- There's more...
- Auditing objects
- Getting ready
- How it works...
- How it works...
- There's more...
- Auditing privileges
- Getting ready
- How it works...
- How it works...
- There's more...
- Implementing fine-grained auditing
- Getting ready
- How to do it...
- How it works...
- There's more...
- Alert mechanism
- Other options
- Integrating Oracle audit with SYSLOG
- Getting ready
- How to do it...
- How it works...
- There is more...
- Auditing sys administrative users
- Getting ready
- How to do it...
- How it works...
- Index
- Title: Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
- Author: Adrian Neagu
- Original title: Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server.
- ISBN: 9781849685276, 9781849685276
- Date of issue: 2012-10-25
- Format: Ebook
- Item ID: e_3c7z
- Publisher: Packt Publishing