Protecting oracle database 12c pdf download
The proprietary nature of the original World Wide Web was gone, and Western Union has been replaced by a free model with the bandwidth to transfer huge sets of valuable information. Web thieves can digitize bestselling books and pirate them for instantaneous downloads anywhere on the planet. Worse yet, internet hackers are now attacking databases and stealing data. The 21 st Century thieves market.
The theft of intellectual property has become an epidemic, and authors like Steven King lost millions of dollars when his bestselling books were digitized and offered for free on the internet. Even modest publishers are at risk. One of my own books, the Oracle Press? Oracle 10g Application Server Administration Handbook?
The publisher McGraw-Hill did not have the thief arrested or prosecuted. But the problem is even worse for those to dare to make their Oracle data accessible over the web, and some companies have had their entire database stolen by foreigners.
But it goes farther than just sub-standard or dicey Oracle support, what happens when you have a data theft problem? It can cost hundreds of thousands of dollars to facilitate the arrest of web criminals for the theft of intellectual property, and the crooks know that many small companies don't have the financial resources to challenge the thieves.
Unless you are a multi-billion dollar company, the average American publisher had little recourse from international Oracle theft. Front Matter Pages Oracle Security History. Pages Current State of the Art. Extrapolating Current Trends. Managing Users in Oracle. Oracle Vulnerability Scanning. Pluggable Database Primer.
New Security Features in 12C. The book demonstrates, through coded examples, how you can enable the consolidation features of Oracle. It covers authentication, access control, encryption, auditing, controlling SQL input, data masking, validating configuration compliance, and more. Oracle Security History2.
Current state of the Art3. Managing Users in Oracle5. Oracle Vulnerability Scanner6. New Security Features in 12C9. Design Flaws, Fixed and Remaining in 12C New Security Issues in 12C Privileged Access Control Foundations Privileged Access Control Methods
0コメント