Today, we see another heavyweight Oracle Publishing House: powerful Oracle Database 10g security by design. The books in the tive series have always been favored by readers. This book should add an important note to Oracle's "indestructible Database.
I don't know when I can see this book in China.
It is worth mentioning that Thomas Kyte is one of the technical editors of this book.
Contents
Part I: Quick Start
CH 1: Best Practices
CH 2: Oracle Database Best Practices
CH 3: security for the grid
Part II: Identification & Authentication
CH 4: Understanding identification and authentication
Ch 5: proxy Authentication
Ch 6: enterprise users & client identifiers
Ch 7: reference example
Part III: authorizations
Ch 8: Demystifying authorizations, access controls, and roles
H 9: Roles choices
Ch 10: reference example
Part IV: fine grained access controls
Ch 11: Row-level security
Ch 12: column-level security
Ch 13: Database Encryption
Ch 14: reference example
Part V: Auditing
Ch 15: standard auditing
Ch 16: fine-grained Auditing
Ch 17: other options
Ch 18: reference example
Part VI: added security measures
Ch 19: how to secure PL/SQL
Ch 20: tips and tricks