Skip to content
Scan a barcode
Scan
Paperback Effective Oracle Database 10g Security by Design Book

ISBN: 0072231300

ISBN13: 9780072231304

Effective Oracle Database 10g Security by Design

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$5.99
Save $70.01!
List Price $76.00
Almost Gone, Only 1 Left!

Book Overview

Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. "In my experience in the security world, including 32 years at the Central Intelligence Agency, I've not found anyone with more experience in the theory and practice of protecting your data than David Knox." --Dave Carey, former Executive Director of the CIA

Customer Reviews

5 ratings

Good Enough for the CIA

It would be easy to be secure if all the data were in one room, there were no connections to the outside world (well I guess you have to have power coming in, but that's all), and there were no people who knew the data. Unfortunately that's not the real world. Breaking the German and Japanese codes during World War II would have been meaningless if that information wasn't used to sink the submarines, divert the convoy, or be ready at Midway. The situation hasn't changed, but the integral capabilities of the Oracle database itself have. As security has gotten ever more important, the steps you need to take get every more complex. At the same time, the users of your data can't be expected to agree, they have a job to do and if security systems prevent them from doing their job they will find ways to bypass or ignore the security system. This book can be read on two levels. First it is an excellent primer on security in general. Second it is Oracle centric so that anyone responsible for security on an Oracle based system need go no further. Note that the Foreward is by David Carey, former Executive Director of the Central Intelligence Agency. It is generally believed that a big contract from the CIA was Oracle's first major success. The implication is that the CIA worked with Oracle to develop the security system discussed here. If the CIA says it's good enough....

Get this Book

This is THE book to own on Oracle 10g Security. In addition to database security, the book also does a great job explaining 10g J2EE application security and identity management. If you want to fully leverage Oracle's powerful database security features in your Oracle applications--and you should--this might be the only detailed roadmap you will find. It IS the only one I could find!

The Bible of Oracle Security

If the solution to your Oracle security problem cannot be found in David Knox's Effective Oracle Security by Design, it cannot be found anywhere. This book is invaluable for anyone needing to understand or implement security in an Oracle 10g or 9i database or middle tier. In addition to clear explanations, there are tested code examples for virtually every task. I would strongly urge anyone concerned with building secure IT systems read this book and take its suggestions. Frankly, I'm not sure how else one could do it.

Excellent step by step how to guide for Oracle Security

Unlike most of Oracle's documentation, which requires you to go through several manuals to accomplish something, this book provides a high to mid level step by step guide for implementing defense in depth and least privilege security for Oracle 10G databases. Granted, this book doesn't go extremely deep to the point of Thomas Kyte's reference manual, but it is an easy read and has specific examples that will help you do basic implementations of Oracle's strongest security capabilities. I highly recommend this book for anyone interested. You will find useful material, regardless of your expertise level.

Highly Recommeded Book

When reading books that serve as Design Guides, the litmus test for it's effectives lies in the answer to the following question, - "Did this book really help me in implementing a solution?" The answer for me was a resounding "YES" especially with regards to Label Security and Proxy Authentication. David Knox does a great job of explaining database security concepts through his examples. Furthermore the passage of an identity through the various layers of an n-tier computing model is clearly explained. The author has done a marvelous job of distilling and articulating his experiences in the information security space.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured