This text teaches readers the why and how of implementing security plans in an Oracle environment. It proceeds logically through the necessary steps, which include: understanding Oracle's security architecture and implementing a plan; securing and interacting with OS's - Windows NT/2000, UNIX, and Linux; securing the database - with concrete examples; securing the network - with coverage of Web site and Oracle Portal security; and protecting against hackers, auditing and troubleshooting. Supplemental information including a glossary of terms, security risk assessment review, a hands-on tutorial to securing a server, and new security features for Oracle9i is also included.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.