Adrian Neagu - Oracle 11g Anti-Hacker's Cookbook [2012, PDF, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям
Торрент Сидеров Личеров Размер
8 3 4.13 МБ
Аватара пользователя
Сообщения: 25933
Зарегистрирован: 05 ноя 2011, 22:02

Adrian Neagu - Oracle 11g Anti-Hacker's Cookbook [2012, PDF, ENG]

Сообщение Nik » 27 дек 2013, 22:59

Oracle 11g Anti-Hacker's Cookbook

Год: October 2012
Автор: Adrian Neagu
Издательство: Packt Publishing
ISBN: 978-1849685269
Язык: Английский
Формат: PDF
Качество: Изначально компьютерное (eBook)
Интерактивное оглавление: Да
Количество страниц: 302
Описание:This book covers the most-important security measures as well as tips and tricks that can be used for better Oracle Database 11g security. The author uses real-world scenarios to show you how to secure the Oracle Database server from different perspectives and against different attack scenarios. Almost every chapter has a possible threats section, which describes the major dangers that can be confronted. The initial chapters cover how to defend your operating system, network, data, and users. The defense scenarios are linked and designed to prevent these attacks. The later chapters cover Oracle Database Vault, Oracle Virtual Private Database, Oracle Label Security, and Oracle Audit Vault. The author also demonstrates how to perform a security assessment against the operating system and the database.
Примеры страниц

Chapter 1: Operating System Security
Using Tripwire for file integrity checking
Using immutable files to prevent modifications
Closing vulnerable network ports and services
Using network security kernel tunables to protect your system
Using TCP wrappers to allow and deny remote connections
Enforcing the use of strong passwords and restricting the use of previous passwords
Restricting direct login and su access
Securing SSH login

Chapter 2: Securing the Network and Data in Transit
Hijacking an Oracle connection
Using OAS network encryption for securing data in motion
Using OAS data integrity for securing data in motion
Using OAS SSL network encryption for securing data in motion
Encrypting network communication using IPSEC
Encrypting network communication with stunnel
Encrypting network communication using SSH tunneling
Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER parameter
Securing external program execution (EXTPROC)
Controlling client connections using the TCP.VALIDNODE_CHECKING listener parameter

Chapter 3: Securing Data at Rest
Using block device encryption
Using filesystem encryption with eCryptfs
Using DBMS_CRYPTO for column encryption
Using Transparent Data Encryption for column encryption
Using TDE for tablespace encryption
Using encryption with data pump
Using encryption with RMAN

Chapter 4: Authentication and User Security
Performing a security evaluation using Oracle Enterprise Manager
Using an offline Oracle password cracker
Using user profiles to enforce password policies
Using secure application roles
How to perform authentication using external password stores
Using SSL authentication

Chapter 5: Beyond Privileges: Oracle Virtual Private Database
Using session-based application contexts
Implementing row-level access policies
Using Oracle Enterprise Manager for managing VPD
Implementing column-level access policies
Implementing VPD grouped policies
Granting exemptions from VPD policies

Chapter 6: Beyond Privileges: Oracle Label Security
Creating and using label components
Defining and using compartments and groups
Using label policy privileges
Using trusted stored units

Chapter 7: Beyond Privileges: Oracle Database Vault
Creating and using Oracle Database Vault realms
Creating and using Oracle Vault command rules
Creating and using Oracle Database Vault rulesets
Creating and using Oracle Database Vault factors
Creating and using Oracle Database Vault reports

Chapter 8: Tracking and Analysis: Database Auditing
Determining how and where to generate audit information
Auditing sessions
Auditing statements
Auditing objects
Auditing privileges
Implementing fine-grained auditing
Integrating Oracle audit with SYSLOG
Auditing sys administrative users

Appendix: Installing and Configuring Guardium, ODF, and OAV

У вас нет необходимых прав для просмотра вложений в этом сообщении.