<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Oracle Database Application Security</title>
    <subTitle>with oracle internet directory oracle access manager and oracle identity manager</subTitle>
  </titleInfo>
  <name type="personal">
    <namePart>Mustafa, Osama.</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Lockard, Robert P.</namePart>
  </name>
  <name type="corporate">
    <namePart>SpringerLink (Online service)</namePart>
  </name>
  <name type="corporate">
    <namePart>O'Reilly (Firm)</namePart>
  </name>
  <name type="corporate">
    <namePart>Serials Solutions</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="local">Electronic books.</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">xxu</placeTerm>
    </place>
    <place>
      <placeTerm type="text">London</placeTerm>
    </place>
    <publisher>Apress</publisher>
    <dateIssued>2022</dateIssued>
    <dateIssued encoding="marc">2019</dateIssued>
    <edition>1st ed. </edition>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <extent>xvii,341 p. ;  PB 24.5 cm.</extent>
  </physicalDescription>
  <abstract>Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more about identity preservation, policies and fine-grained audits. Moving on to virtual private databases, you'll set up and configure a VPD to work in concert with other security features in Oracle, followed by tips on managing configuration drift, profiles, and default users. Shifting focus to coding, you will take a look at secure coding standards, multi-schema database models, code-based access control, and SQL injection. Finally, you'll cover single sign-on (SSO), and will be introduced to Oracle Internet Directory (OID), Oracle Access Manager (OAM), and Oracle Identity Management (OIM) by installing and configuring them to meet your needs. Oracle databases hold the majority of the world's relational data, and are attractive targets for attackers seeking high-value targets for data theft. Compromise of a single Oracle Database can result in tens of millions of breached records costing millions in breach-mitigation activity. This book gets you ready to avoid that nightmare scenario. You will: Work with Oracle Internet Directory using the command-line and the console Integrate Oracle Access Manager with different applications Work with the Oracle Identity Manager console and connectors, while creating your own custom one Troubleshooting issues with OID, OAM, and OID Dive deep into file system and network security concepts .</abstract>
  <tableOfContents>Chapter 01 - Encryption -- Chapter 02 - Audit -- Chapter 03 - Privilege Analysis -- Chapter 04 - Oracle Database threats -- Chapter 05 - Network access and Evaluation -- Chapter 06 - Coding -- Chapter 07 - Single Sign On (SSO).</tableOfContents>
  <note type="statement of responsibility">by Osama Mustafa and Robert P. Lockard .</note>
  <note>Requires an SPL library card.</note>
  <note>Mode of access: World Wide Web.</note>
  <subject authority="lcsh">
    <topic>Audits</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Privilege analysis</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Oracle database threats</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Network access and evaluation</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Secure coding and design</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Single sign on</topic>
  </subject>
  <classification authority="ddc" edition="1">005.7401 MUSO</classification>
  <relatedItem type="host">
    <titleInfo>
      <title>Springer eBooks</title>
    </titleInfo>
  </relatedItem>
  <relatedItem type="otherFormat" displayLabel="Printed edition:"/>
  <relatedItem type="otherFormat" displayLabel="Printed edition:"/>
  <identifier type="isbn">9781484253663</identifier>
  <identifier type="uri">https://ezproxy.spl.org/login?url=https://learning.oreilly.com/library/view/~/9781484253670/?ar</identifier>
  <location>
    <url displayLabel="View this electronic item in O'Reilly Online Learning: Academic/Public Library Edition.">https://ezproxy.spl.org/login?url=https://learning.oreilly.com/library/view/~/9781484253670/?ar</url>
  </location>
  <accessCondition type="restrictionOnAccess">Requires an SPL library card.</accessCondition>
  <recordInfo>
    <recordContentSource authority="marcorg"/>
    <recordCreationDate encoding="marc">191031</recordCreationDate>
    <recordChangeDate encoding="iso8601">20250131103307.0</recordChangeDate>
    <recordIdentifier source="WaSeSS">ssj0002240077</recordIdentifier>
  </recordInfo>
</mods>
