tailieunhanh - Applied Oracle Security: Developing Secure Database and Middleware Environments- P64

Applied Oracle Security: Developing Secure Database and Middleware Environments- P64:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | 604 Applied Oracle Security Oracle Business Intelligence examples 580-592 auditing 582 authentication 589-592 preparations 581-583 recommended testing 586-587 RPD descriptions 588-592 scripts 582-583 setup process 583-586 SSO integration 592 users and groups 580-581 web catalog descriptions 587-588 Oracle Call Interface OCI 504 Oracle Data Dictionary DBV integration and 329 object-owner accounts in 332 Oracle Database 10g Release 2 column-level encryption 38-43 TDE setup 34-35 Oracle Database 11g Advanced Security features 33 DBV integration with 329-344 tablespace encryption 44-45 TDE configuration 45-55 Oracle Database Vault. See Database Vault Oracle Delivers component 530 587 Oracle Directory Management 373-374 Oracle Enterprise Manager Grid Control OEM GC DBV policy deployment and validation with 327-329 monitoring and alerting on DBV with 345-347 Oracle Entitlement Server OES 380-381 architecture of 380 381 developer s view of 380-381 Oracle External Tables OETs 312-318 Oracle HTTP Server OHS 434 enabling SSL in 452-454 password obfuscation in 445 Oracle Identity Federation OIF 377 Oracle Identity Manager OIM 386-403 access policies 389 394-396 access reporting 401 attestation 399-400 compliance solutions 399-401 deployment architecture 402-403 discretionary account provisioning 391-392 IMOM information and 362 IT resources 390 organizations 388-389 overview of 386-390 provisioning integrations 397-398 provisioning processes 390-396 reconciliation integrations 398-399 resource objects 390 self-service provisioning 392-393 summary of 403 user provisioning 372-373 386 390-398 users and user groups 387-388 workflow-based provisioning 393-394 See also identity management Oracle Internet Directory OID 156 217 303 406-409 architecture 407 synchronizations 373-374 408-409 Oracle Label Security OLS declarative framework of 99 factor integration with 174-189 221-222 identifying tables protected by 294 Oracle VPD comparison 228 Oracle Metalink notes 185 Oracle Proxy .