TAILIEUCHUNG - Applied Oracle Security: Developing Secure Database and Middleware Environments- P4

Applied Oracle Security: Developing Secure Database and Middleware Environments- P4:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | 4 Part I Oracle Database Security New Features omputer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity computer security has reached what many consider to be early adulthood. From advances in encryption and encryption devices to identity management and enterprise auditing the computer security field is as vast and complex as it is sophisticated and powerful. Database and application security form one end of the computer security field. These two areas are closely aligned because of the heavy and obvious relationship between applications and databases. Along with other areas of security database and application security continues to evolve rapidly. Creating a sound and secure database application is challenging not just because it can be complex but more so because of the many possible methods that can be used to accomplish it. While working with the many customers of Oracle Corporation the authors have noticed two important things with respect to application and database security. First in the architecture and design phases complexity exists due to the technology and the various options available to reach an optimal level of security. Second in the development and deployment phases most people don t employ full and complete security implementations. Their reasons for this vary but their obvious lack of knowledge and lack of a set of reference architectures from which to draw upon are key. This not only limits what can be crafted as a viable solution but can also have disastrous effects in cost overruns project delays inadequate results and vulnerable systems. They have not mitigated the risks to an acceptable level. About This Book In this book we have brought together top experts in business intelligence BI application development identity management and the Oracle Database. We ll show you how to use application security features the .

TÀI LIỆU LIÊN QUAN