万本电子书0元读

万本电子书0元读

顶部广告

Oracle 11g Anti-hacker's Cookbook电子书

售       价:¥

2人正在读 | 0人评论 9.8

作       者:Adrian Neagu

出  版  社:Packt Publishing

出版时间:2012-10-25

字       数:148.3万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts.
目录展开

Oracle 11g Anti-hacker's Cookbook

Table of Contents

Oracle 11g Anti-hacker's Cookbook

Credits

Foreword

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Instant Updates on New Packt Books

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Operating System Security

Introduction

Using Tripwire for file integrity checking

Getting ready

How to do it...

How it works...

There's more...

Other administrative options

Using immutable files to prevent modifications

Getting ready

How to do it...

How it works...

There's more...

Closing vulnerable network ports and services

Getting ready

How to do it...

How it works...

There's more...

Using network security kernel tunables to protect your system

How to do it...

How it works...

There's more...

Using TCP wrappers to allow and deny remote connections

Getting ready

How to do it...

How it works...

There is more...

Enforcing the use of strong passwords and restricting the use of previous passwords

Getting ready

How to do it...

How it works...

There is more...

Performing a security assessment on current passwords with the John the Ripper password cracker tool

Restricting direct login and su access

Getting ready

How to do it...

How it works...

There's more...

Securing SSH login

Getting ready

How to do it...

How it works...

There's more...

Setting up public key authentication

2. Securing the Network and Data in Transit

Introduction

Hijacking an Oracle connection

Getting ready

How to do it...

How it works...

There's more...

See also...

Using OAS network encryption for securing data in motion

Getting ready

How to do it...

How it works...

There's more...

Using OAS data integrity for securing data in motion

Getting ready

How to do it...

How it works...

There's more...

Using OAS SSL network encryption for securing data in motion

Getting ready

How to do it...

How it works...

There's more...

Encrypting network communication using IPSEC

Getting ready

How it works...

How it works...

There's more...

Encrypting network communication with stunnel

Getting ready

How to do it...

How it works...

There's more...

Encrypting network communication using SSH tunneling

Getting ready

How to do it...

How it works...

There's more...

Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER parameter

Getting ready

How to do it...

How it works...

There's more...

Securing external program execution (EXTPROC)

Getting ready

How to do it...

How it works...

There's more...

See Also

Controlling client connections using the TCP.VALIDNODE_CHECKING listener parameter

Getting ready

How to do it...

How it works...

There's more...

3. Securing Data at Rest

Introduction

Using block device encryption

Getting ready

How to do it...

How it works...

There's more...

Using filesystem encryption with eCryptfs

Getting ready

How to do it...

How it works...

There's more...

Using DBMS_CRYPTO for column encryption

Getting Ready

How to do it...

How it works...

There's more...

Using Transparent Data Encryption for column encryption

Getting ready

How to do it...

How it works...

There's more...

Performance implications

Limitations:

Recommendations

See also

Using TDE for tablespace encryption

Getting ready

How to do it...

How it works...

There's more...

Encryption key management

Using encryption with data pump

Getting ready

How to do it...

How it works...

Using encryption with RMAN

Getting ready

How to do it...

How it works...

There's more...

4. Authentication and User Security

Introduction

Performing a security evaluation using Oracle Enterprise Manager

Getting ready

How to do it...

How it works...

There's more...

Using an offline Oracle password cracker

Getting ready

How to do it...

How it works...

There's more...

Using user profiles to enforce password policies

Getting ready

How to do it...

How it works...

There's more...

Using secure application roles

Getting ready

How to do it...

How it works...

There's more...

See also

How to perform authentication using external password stores

Getting ready

How to do it...

How it works...

There's more...

Using SSL authentication

Getting ready

How to do it...

How it works...

There's more...

5. Beyond Privileges: Oracle Virtual Private Database

Introduction

Using session-based application contexts

Getting ready

How to do it...

How it works...

There's more...

Implementing row-level access policies

Getting ready

How to do it...

How it works...

There's more...

Performance implications

Using Oracle Enterprise Manager for managing VPD

Getting ready

How to do it...

How it works...

Implementing column-level access policies

Getting ready

How to do it...

How it works...

Implementing VPD grouped policies

Getting ready

How to do it...

How it works...

There's more...

Granting exemptions from VPD policies

How to do it...

How it works...

There's more...

6. Beyond Privileges: Oracle Label Security

Introduction

Creating and using label components

Getting ready

How to do it...

How it works...

There's more...

Defining and using compartments and groups

Getting ready

How to do it...

How it works...

There's more...

Using label policy privileges

Getting ready

How to do it...

How it works...

There's more...

Using trusted stored units

Getting ready

How to do it...

How it works...

There's more...

7. Beyond Privileges: Oracle Database Vault

Introduction

Creating and using Oracle Database Vault realms

Getting ready

How to do it...

How it works...

There's more...

Creating and using Oracle Vault command rules

Getting ready

How to do it...

How it works...

There's more...

Creating and using Oracle Database Vault rulesets

Getting ready

How to do it...

How it works...

There's more...

Creating and using Oracle Database Vault factors

Getting ready

How to do it...

How it works...

There's more...

Creating and using Oracle Database Vault reports

Getting ready

How to do it...

How it works...

There's more...

8. Tracking and Analysis: Database Auditing

Introduction

Determining how and where to generate audit information

Getting ready

How to do it...

How it works...

There's more...

See also

Auditing sessions

Getting ready

How to do it...

How it works...

There's more...

Auditing statements

Getting ready

How to do it...

How it works...

There's more...

Auditing objects

Getting ready

How it works...

How it works...

There's more...

Auditing privileges

Getting ready

How it works...

How it works...

There's more...

Implementing fine-grained auditing

Getting ready

How to do it...

How it works...

There's more...

Alert mechanism

Other options

Integrating Oracle audit with SYSLOG

Getting ready

How to do it...

How it works...

There is more...

Auditing sys administrative users

Getting ready

How to do it...

How it works...

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部