0

My Bag

0.00

Download App

Applied Oracle Security: Developing Secure Database and Middleware Environments 12.0%OFF

Applied Oracle Security: Developing Secure Database and Middleware Environments

by David C. Knox

  • ISBN

    :  

    9780070683556

  • Publisher

    :  

    Tata Mcgraw Hill Education Private Limited

  • Subject

    :  

    Computer Science, Computer Programming / Software Development, Computer Certification

  • Binding

    :  

    softcover

  • Pages

    :  

    610

  • Year

    :  

    2009

675.0

12.0% OFF

594.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today's IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.

  • Author Biography

    David C. Knox is the senior director of the Solution Engineering division for Oracle North American Sales and Consulting. Table of Contents Part I: Oracle Database Security New Features Chapter 1. Security Blueprints and New Thinking Chapter 2. Transparent Data Encryption Chapter 3. Applied Auditing and Audit Vault Part II: Oracle Database Vault Chapter 4. Database Vault Introduction Chapter 5. Database Vault Fundamentals Chapter 6. Applied Database Vault for Custom Applications Chapter 7. Applied Database Vault for Existing Applications Part III: Identity Management Chapter 8. Architecting Identity Management Chapter 9. Oracle Identity Manager Chapter 10. Oracle Directory Services Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence Chapter 11. Web-centric Security in APEX Chapter 12. Secure Coding Practices in APEX Chapter 13. Securing Access to Oracle BI Chapter 14. Securing Oracle BI Content and Data Appendix A. Using the OracleBI Examples

Related Items

-

of

  • OFFER

    Optimizing Voice in ATM/IP Mobile Networks

    Juliet Bates

    Starts At

    3948.0

    5561.0

    29% OFF

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • OFFER

    Visual C++ Programming

    Yashavant P. Kanetkar

    Starts At

    288.0

    390.0

    26% OFF

  • Integrated Telecommunications Management Solutions

    Graham Chen

    Starts At

    11558.0

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    Neural Networks and Artificial Intelligence for Biomedical Engineering

    Donna L. Hudson

    Starts At

    15918.0

    18510.0

    14% OFF

  • The Man-eating Leopard of Rudraprayag (Oxford India Paperbacks)

    Jim Corbett

    Starts At

    275.0

  • OFFER

    Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition

    Douglas R. Hofstadter

    Starts At

    813.0

    1099.0

    26% OFF

  • Biomedical Instrumentation and Measurements

    Weibell J Fred

    Starts At

    350.0

  • OFFER

    WritingBetter Requirements

    Ian Alexander

    Starts At

    8252.0

    9596.0

    14% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- 1 Item

null

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : 0.0 Total Savings        : Grand Total :

Order Summary