Applied Oracle Security: Developing Secure Database and Middleware Environments

Nonfiction, Computers, Database Management
Cover of the book Applied Oracle Security: Developing Secure Database and Middleware Environments by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise ISBN: 9780071613712
Publisher: McGraw-Hill Companies,Inc. Publication: October 15, 2009
Imprint: McGraw-Hill Osborne Media Language: English
Author: David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
ISBN: 9780071613712
Publisher: McGraw-Hill Companies,Inc.
Publication: October 15, 2009
Imprint: McGraw-Hill Osborne Media
Language: English

Cutting-edge techniques from leading Oracle security experts This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications. Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today's IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cutting-edge techniques from leading Oracle security experts This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications. Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today's IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.

More books from McGraw-Hill Companies,Inc.

Cover of the book 2-The Problems with Project Management by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Logic DeMYSTiFied by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 6 - Hypothesis Testing by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Six Sigma Business Scorecard, Chapter 16 - Integrating the Six Sigma Business Scorecard and Quality Management Systems by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Active Portfolio Management: A Quantitative Approach for Producing Superior Returns and Selecting Superior Returns and Controlling Risk by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Lean Six Sigma for Supply Chain Management, Chapter 4 - Lead-Time Impact on Lean Six Sigma Projects by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book PeopleSoft PeopleTools Tips & Techniques by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Fusion Analysis (EBOOK) by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Microsoft SharePoint 2010 Web Applications The Complete Reference by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Six Sigma Business Scorecard, Chapter 6 - Six Sigma Business Scorecard Development by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Ownership Thinking: How to End Entitlement and Create a Culture of Accountability, Purpose, and Profit by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Gray Hat Hacking The Ethical Hackers Handbook 3/E by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Lean Six Sigma for Supply Chain Management, Chapter 1 - Using Lean Six Sigma Methods to Identify and Manage Supply Chain Projects by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book STATISTICS DEMYSTIFIED 2/E by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 13 - Measurement Systems Analysis -- MSA: Is Your Measurement Process Lying to You? by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy