Oracle 11g Anti-hacker's Cookbook
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Pub.
2012
|
Schriftenreihe: | Quick answers to common problems
|
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042965134 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151030s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781849685276 |c electronic bk. |9 978-1-84968-527-6 | ||
020 | |a 1849685274 |c electronic bk. |9 1-84968-527-4 | ||
020 | |a 9781849685269 |9 978-1-84968-526-9 | ||
020 | |a 1849685266 |9 1-84968-526-6 | ||
035 | |a (OCoLC)818819131 | ||
035 | |a (DE-599)BVBBV042965134 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.7585 | |
082 | 0 | |a 658.15/0285/5369 | |
100 | 1 | |a Neagu, Adrian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Oracle 11g Anti-hacker's Cookbook |
264 | 1 | |a Birmingham |b Packt Pub. |c 2012 | |
300 | |a 1 Online-Ressource (428 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Quick answers to common problems | |
500 | |a There's more .. | ||
500 | |a Oracle 11g Anti-hacker's Cookbook; Oracle 11g Anti-hacker's Cookbook; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Operating System Security; Introduction; Using Tripwire for file integrity checking; Getting ready; How to do it .. | ||
500 | |a How it works ... There's more ... ; Other administrative options; Using immutable files to prevent modifications; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Closing vulnerable network ports and services; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using network security kernel tunables to protect your system; How to do it ... ; How it works ... ; There's more ... ; Using TCP wrappers to allow and deny remote connections; Getting ready; How to do it ... ; How it works ... ; There is more .. | ||
500 | |a Enforcing the use of strong passwords and restricting the use of previous passwordsGetting ready; How to do it ... ; How it works ... ; There is more ... ; Performing a security assessment on current passwords with the John the Ripper password cracker tool; Restricting direct login and su access; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing SSH login; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Setting up public key authentication; 2. Securing the Network and Data in Transit; Introduction; Hijacking an Oracle connection; Getting ready | ||
500 | |a How to do it ... How it works ... ; There's more ... ; See also ... ; Using OAS network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS data integrity for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS SSL network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using IPSEC; Getting ready; How it works ... ; How it works ... ; There's more ... ; Encrypting network communication with stunnel | ||
500 | |a Getting readyHow to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using SSH tunneling; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER parameter; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing external program execution (EXTPROC); Getting ready; How to do it ... ; How it works ... ; There's more ... ; See Also; Controlling client connections using the TCP. VALIDNODE_CHECKING listener parameter; Getting ready; How to do it ... ; How it works .. | ||
500 | |a This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts | ||
630 | 0 | 4 | |a Oracle (Computer file) |
650 | 4 | |a Electronic commerce / Computer programs | |
650 | 4 | |a Oracle E-business suite | |
650 | 4 | |a Computer security | |
650 | 4 | |a Database management | |
650 | 4 | |a Relational databases | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Finance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Finance |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a Oracle (Computer file) |2 blmlsh | |
650 | 7 | |a Oracle (Computer file) |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Database management |2 fast | |
650 | 7 | |a Relational databases |2 fast | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Computer security | |
650 | 4 | |a Database management | |
650 | 4 | |a Relational databases | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=499146 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBU | ||
940 | 1 | |q FLA_PDA_EBU | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028391001 |
Datensatz im Suchindex
_version_ | 1804175290210975744 |
---|---|
any_adam_object | |
author | Neagu, Adrian |
author_facet | Neagu, Adrian |
author_role | aut |
author_sort | Neagu, Adrian |
author_variant | a n an |
building | Verbundindex |
bvnumber | BV042965134 |
collection | ZDB-4-EBU |
ctrlnum | (OCoLC)818819131 (DE-599)BVBBV042965134 |
dewey-full | 005.7585 658.15/0285/5369 |
dewey-hundreds | 000 - Computer science, information, general works 600 - Technology (Applied sciences) |
dewey-ones | 005 - Computer programming, programs, data, security 658 - General management |
dewey-raw | 005.7585 658.15/0285/5369 |
dewey-search | 005.7585 658.15/0285/5369 |
dewey-sort | 15.7585 |
dewey-tens | 000 - Computer science, information, general works 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05410nmm a2200649zc 4500</leader><controlfield tag="001">BV042965134</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151030s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849685276</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84968-527-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849685274</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84968-527-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849685269</subfield><subfield code="9">978-1-84968-526-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849685266</subfield><subfield code="9">1-84968-526-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)818819131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042965134</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.7585</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.15/0285/5369</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Neagu, Adrian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Oracle 11g Anti-hacker's Cookbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (428 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Quick answers to common problems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">There's more ..</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Oracle 11g Anti-hacker's Cookbook; Oracle 11g Anti-hacker's Cookbook; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Operating System Security; Introduction; Using Tripwire for file integrity checking; Getting ready; How to do it ..</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How it works ... There's more ... ; Other administrative options; Using immutable files to prevent modifications; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Closing vulnerable network ports and services; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using network security kernel tunables to protect your system; How to do it ... ; How it works ... ; There's more ... ; Using TCP wrappers to allow and deny remote connections; Getting ready; How to do it ... ; How it works ... ; There is more ..</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Enforcing the use of strong passwords and restricting the use of previous passwordsGetting ready; How to do it ... ; How it works ... ; There is more ... ; Performing a security assessment on current passwords with the John the Ripper password cracker tool; Restricting direct login and su access; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing SSH login; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Setting up public key authentication; 2. Securing the Network and Data in Transit; Introduction; Hijacking an Oracle connection; Getting ready</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How to do it ... How it works ... ; There's more ... ; See also ... ; Using OAS network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS data integrity for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS SSL network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using IPSEC; Getting ready; How it works ... ; How it works ... ; There's more ... ; Encrypting network communication with stunnel</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Getting readyHow to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using SSH tunneling; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER parameter; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing external program execution (EXTPROC); Getting ready; How to do it ... ; How it works ... ; There's more ... ; See Also; Controlling client connections using the TCP. VALIDNODE_CHECKING listener parameter; Getting ready; How to do it ... ; How it works ..</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Oracle (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce / Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Oracle E-business suite</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Relational databases</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Finance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Finance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Oracle (Computer file)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Oracle (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Relational databases</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Relational databases</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=499146</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028391001</subfield></datafield></record></collection> |
id | DE-604.BV042965134 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:13:56Z |
institution | BVB |
isbn | 9781849685276 1849685274 9781849685269 1849685266 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028391001 |
oclc_num | 818819131 |
open_access_boolean | |
physical | 1 Online-Ressource (428 pages) |
psigel | ZDB-4-EBU FLA_PDA_EBU |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Packt Pub. |
record_format | marc |
series2 | Quick answers to common problems |
spelling | Neagu, Adrian Verfasser aut Oracle 11g Anti-hacker's Cookbook Birmingham Packt Pub. 2012 1 Online-Ressource (428 pages) txt rdacontent c rdamedia cr rdacarrier Quick answers to common problems There's more .. Oracle 11g Anti-hacker's Cookbook; Oracle 11g Anti-hacker's Cookbook; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Operating System Security; Introduction; Using Tripwire for file integrity checking; Getting ready; How to do it .. How it works ... There's more ... ; Other administrative options; Using immutable files to prevent modifications; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Closing vulnerable network ports and services; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using network security kernel tunables to protect your system; How to do it ... ; How it works ... ; There's more ... ; Using TCP wrappers to allow and deny remote connections; Getting ready; How to do it ... ; How it works ... ; There is more .. Enforcing the use of strong passwords and restricting the use of previous passwordsGetting ready; How to do it ... ; How it works ... ; There is more ... ; Performing a security assessment on current passwords with the John the Ripper password cracker tool; Restricting direct login and su access; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing SSH login; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Setting up public key authentication; 2. Securing the Network and Data in Transit; Introduction; Hijacking an Oracle connection; Getting ready How to do it ... How it works ... ; There's more ... ; See also ... ; Using OAS network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS data integrity for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS SSL network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using IPSEC; Getting ready; How it works ... ; How it works ... ; There's more ... ; Encrypting network communication with stunnel Getting readyHow to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using SSH tunneling; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER parameter; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing external program execution (EXTPROC); Getting ready; How to do it ... ; How it works ... ; There's more ... ; See Also; Controlling client connections using the TCP. VALIDNODE_CHECKING listener parameter; Getting ready; How to do it ... ; How it works .. This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts Oracle (Computer file) Electronic commerce / Computer programs Oracle E-business suite Computer security Database management Relational databases BUSINESS & ECONOMICS / Corporate Finance bisacsh BUSINESS & ECONOMICS / Finance bisacsh COMPUTERS / Data Processing bisacsh Oracle (Computer file) blmlsh Oracle (Computer file) fast Computer security fast Database management fast Relational databases fast Wirtschaft http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=499146 Aggregator Volltext |
spellingShingle | Neagu, Adrian Oracle 11g Anti-hacker's Cookbook Oracle (Computer file) Electronic commerce / Computer programs Oracle E-business suite Computer security Database management Relational databases BUSINESS & ECONOMICS / Corporate Finance bisacsh BUSINESS & ECONOMICS / Finance bisacsh COMPUTERS / Data Processing bisacsh Oracle (Computer file) blmlsh Oracle (Computer file) fast Computer security fast Database management fast Relational databases fast Wirtschaft |
title | Oracle 11g Anti-hacker's Cookbook |
title_auth | Oracle 11g Anti-hacker's Cookbook |
title_exact_search | Oracle 11g Anti-hacker's Cookbook |
title_full | Oracle 11g Anti-hacker's Cookbook |
title_fullStr | Oracle 11g Anti-hacker's Cookbook |
title_full_unstemmed | Oracle 11g Anti-hacker's Cookbook |
title_short | Oracle 11g Anti-hacker's Cookbook |
title_sort | oracle 11g anti hacker s cookbook |
topic | Oracle (Computer file) Electronic commerce / Computer programs Oracle E-business suite Computer security Database management Relational databases BUSINESS & ECONOMICS / Corporate Finance bisacsh BUSINESS & ECONOMICS / Finance bisacsh COMPUTERS / Data Processing bisacsh Oracle (Computer file) blmlsh Oracle (Computer file) fast Computer security fast Database management fast Relational databases fast Wirtschaft |
topic_facet | Oracle (Computer file) Electronic commerce / Computer programs Oracle E-business suite Computer security Database management Relational databases BUSINESS & ECONOMICS / Corporate Finance BUSINESS & ECONOMICS / Finance COMPUTERS / Data Processing Wirtschaft |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=499146 |
work_keys_str_mv | AT neaguadrian oracle11gantihackerscookbook |