Oracle 11g Anti-hacker's Cookbook

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Neagu, Adrian (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham Packt Pub. 2012
Schriftenreihe:Quick answers to common problems
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV042965134
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151030s2012 |||| o||u| ||||||eng d
020 |a 9781849685276  |c electronic bk.  |9 978-1-84968-527-6 
020 |a 1849685274  |c electronic bk.  |9 1-84968-527-4 
020 |a 9781849685269  |9 978-1-84968-526-9 
020 |a 1849685266  |9 1-84968-526-6 
035 |a (OCoLC)818819131 
035 |a (DE-599)BVBBV042965134 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
082 0 |a 005.7585 
082 0 |a 658.15/0285/5369 
100 1 |a Neagu, Adrian  |e Verfasser  |4 aut 
245 1 0 |a Oracle 11g Anti-hacker's Cookbook 
264 1 |a Birmingham  |b Packt Pub.  |c 2012 
300 |a 1 Online-Ressource (428 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Quick answers to common problems 
500 |a There's more .. 
500 |a Oracle 11g Anti-hacker's Cookbook; Oracle 11g Anti-hacker's Cookbook; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Operating System Security; Introduction; Using Tripwire for file integrity checking; Getting ready; How to do it .. 
500 |a How it works ... There's more ... ; Other administrative options; Using immutable files to prevent modifications; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Closing vulnerable network ports and services; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using network security kernel tunables to protect your system; How to do it ... ; How it works ... ; There's more ... ; Using TCP wrappers to allow and deny remote connections; Getting ready; How to do it ... ; How it works ... ; There is more .. 
500 |a Enforcing the use of strong passwords and restricting the use of previous passwordsGetting ready; How to do it ... ; How it works ... ; There is more ... ; Performing a security assessment on current passwords with the John the Ripper password cracker tool; Restricting direct login and su access; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing SSH login; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Setting up public key authentication; 2. Securing the Network and Data in Transit; Introduction; Hijacking an Oracle connection; Getting ready 
500 |a How to do it ... How it works ... ; There's more ... ; See also ... ; Using OAS network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS data integrity for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS SSL network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using IPSEC; Getting ready; How it works ... ; How it works ... ; There's more ... ; Encrypting network communication with stunnel 
500 |a Getting readyHow to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using SSH tunneling; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER parameter; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing external program execution (EXTPROC); Getting ready; How to do it ... ; How it works ... ; There's more ... ; See Also; Controlling client connections using the TCP. VALIDNODE_CHECKING listener parameter; Getting ready; How to do it ... ; How it works .. 
500 |a This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts 
630 0 4 |a Oracle (Computer file) 
650 4 |a Electronic commerce / Computer programs 
650 4 |a Oracle E-business suite 
650 4 |a Computer security 
650 4 |a Database management 
650 4 |a Relational databases 
650 7 |a BUSINESS & ECONOMICS / Corporate Finance  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS / Finance  |2 bisacsh 
650 7 |a COMPUTERS / Data Processing  |2 bisacsh 
650 7 |a Oracle (Computer file)  |2 blmlsh 
650 7 |a Oracle (Computer file)  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Database management  |2 fast 
650 7 |a Relational databases  |2 fast 
650 4 |a Wirtschaft 
650 4 |a Computer security 
650 4 |a Database management 
650 4 |a Relational databases 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=499146  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBU 
940 1 |q FLA_PDA_EBU 
999 |a oai:aleph.bib-bvb.de:BVB01-028391001 

Datensatz im Suchindex

_version_ 1804175290210975744
any_adam_object
author Neagu, Adrian
author_facet Neagu, Adrian
author_role aut
author_sort Neagu, Adrian
author_variant a n an
building Verbundindex
bvnumber BV042965134
collection ZDB-4-EBU
ctrlnum (OCoLC)818819131
(DE-599)BVBBV042965134
dewey-full 005.7585
658.15/0285/5369
dewey-hundreds 000 - Computer science, information, general works
600 - Technology (Applied sciences)
dewey-ones 005 - Computer programming, programs, data, security
658 - General management
dewey-raw 005.7585
658.15/0285/5369
dewey-search 005.7585
658.15/0285/5369
dewey-sort 15.7585
dewey-tens 000 - Computer science, information, general works
650 - Management and auxiliary services
discipline Informatik
Wirtschaftswissenschaften
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05410nmm a2200649zc 4500</leader><controlfield tag="001">BV042965134</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151030s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849685276</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84968-527-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849685274</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84968-527-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849685269</subfield><subfield code="9">978-1-84968-526-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849685266</subfield><subfield code="9">1-84968-526-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)818819131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042965134</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.7585</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.15/0285/5369</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Neagu, Adrian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Oracle 11g Anti-hacker's Cookbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (428 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Quick answers to common problems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">There's more ..</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Oracle 11g Anti-hacker's Cookbook; Oracle 11g Anti-hacker's Cookbook; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Operating System Security; Introduction; Using Tripwire for file integrity checking; Getting ready; How to do it ..</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How it works ... There's more ... ; Other administrative options; Using immutable files to prevent modifications; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Closing vulnerable network ports and services; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using network security kernel tunables to protect your system; How to do it ... ; How it works ... ; There's more ... ; Using TCP wrappers to allow and deny remote connections; Getting ready; How to do it ... ; How it works ... ; There is more ..</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Enforcing the use of strong passwords and restricting the use of previous passwordsGetting ready; How to do it ... ; How it works ... ; There is more ... ; Performing a security assessment on current passwords with the John the Ripper password cracker tool; Restricting direct login and su access; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing SSH login; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Setting up public key authentication; 2. Securing the Network and Data in Transit; Introduction; Hijacking an Oracle connection; Getting ready</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How to do it ... How it works ... ; There's more ... ; See also ... ; Using OAS network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS data integrity for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS SSL network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using IPSEC; Getting ready; How it works ... ; How it works ... ; There's more ... ; Encrypting network communication with stunnel</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Getting readyHow to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using SSH tunneling; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER parameter; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing external program execution (EXTPROC); Getting ready; How to do it ... ; How it works ... ; There's more ... ; See Also; Controlling client connections using the TCP. VALIDNODE_CHECKING listener parameter; Getting ready; How to do it ... ; How it works ..</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Oracle (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce / Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Oracle E-business suite</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Relational databases</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS &amp; ECONOMICS / Corporate Finance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS &amp; ECONOMICS / Finance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Oracle (Computer file)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Oracle (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Relational databases</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Relational databases</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=499146</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028391001</subfield></datafield></record></collection>
id DE-604.BV042965134
illustrated Not Illustrated
indexdate 2024-07-10T07:13:56Z
institution BVB
isbn 9781849685276
1849685274
9781849685269
1849685266
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028391001
oclc_num 818819131
open_access_boolean
physical 1 Online-Ressource (428 pages)
psigel ZDB-4-EBU
FLA_PDA_EBU
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Packt Pub.
record_format marc
series2 Quick answers to common problems
spelling Neagu, Adrian Verfasser aut
Oracle 11g Anti-hacker's Cookbook
Birmingham Packt Pub. 2012
1 Online-Ressource (428 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Quick answers to common problems
There's more ..
Oracle 11g Anti-hacker's Cookbook; Oracle 11g Anti-hacker's Cookbook; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Operating System Security; Introduction; Using Tripwire for file integrity checking; Getting ready; How to do it ..
How it works ... There's more ... ; Other administrative options; Using immutable files to prevent modifications; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Closing vulnerable network ports and services; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using network security kernel tunables to protect your system; How to do it ... ; How it works ... ; There's more ... ; Using TCP wrappers to allow and deny remote connections; Getting ready; How to do it ... ; How it works ... ; There is more ..
Enforcing the use of strong passwords and restricting the use of previous passwordsGetting ready; How to do it ... ; How it works ... ; There is more ... ; Performing a security assessment on current passwords with the John the Ripper password cracker tool; Restricting direct login and su access; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing SSH login; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Setting up public key authentication; 2. Securing the Network and Data in Transit; Introduction; Hijacking an Oracle connection; Getting ready
How to do it ... How it works ... ; There's more ... ; See also ... ; Using OAS network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS data integrity for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using OAS SSL network encryption for securing data in motion; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using IPSEC; Getting ready; How it works ... ; How it works ... ; There's more ... ; Encrypting network communication with stunnel
Getting readyHow to do it ... ; How it works ... ; There's more ... ; Encrypting network communication using SSH tunneling; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER parameter; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Securing external program execution (EXTPROC); Getting ready; How to do it ... ; How it works ... ; There's more ... ; See Also; Controlling client connections using the TCP. VALIDNODE_CHECKING listener parameter; Getting ready; How to do it ... ; How it works ..
This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts
Oracle (Computer file)
Electronic commerce / Computer programs
Oracle E-business suite
Computer security
Database management
Relational databases
BUSINESS & ECONOMICS / Corporate Finance bisacsh
BUSINESS & ECONOMICS / Finance bisacsh
COMPUTERS / Data Processing bisacsh
Oracle (Computer file) blmlsh
Oracle (Computer file) fast
Computer security fast
Database management fast
Relational databases fast
Wirtschaft
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=499146 Aggregator Volltext
spellingShingle Neagu, Adrian
Oracle 11g Anti-hacker's Cookbook
Oracle (Computer file)
Electronic commerce / Computer programs
Oracle E-business suite
Computer security
Database management
Relational databases
BUSINESS & ECONOMICS / Corporate Finance bisacsh
BUSINESS & ECONOMICS / Finance bisacsh
COMPUTERS / Data Processing bisacsh
Oracle (Computer file) blmlsh
Oracle (Computer file) fast
Computer security fast
Database management fast
Relational databases fast
Wirtschaft
title Oracle 11g Anti-hacker's Cookbook
title_auth Oracle 11g Anti-hacker's Cookbook
title_exact_search Oracle 11g Anti-hacker's Cookbook
title_full Oracle 11g Anti-hacker's Cookbook
title_fullStr Oracle 11g Anti-hacker's Cookbook
title_full_unstemmed Oracle 11g Anti-hacker's Cookbook
title_short Oracle 11g Anti-hacker's Cookbook
title_sort oracle 11g anti hacker s cookbook
topic Oracle (Computer file)
Electronic commerce / Computer programs
Oracle E-business suite
Computer security
Database management
Relational databases
BUSINESS & ECONOMICS / Corporate Finance bisacsh
BUSINESS & ECONOMICS / Finance bisacsh
COMPUTERS / Data Processing bisacsh
Oracle (Computer file) blmlsh
Oracle (Computer file) fast
Computer security fast
Database management fast
Relational databases fast
Wirtschaft
topic_facet Oracle (Computer file)
Electronic commerce / Computer programs
Oracle E-business suite
Computer security
Database management
Relational databases
BUSINESS & ECONOMICS / Corporate Finance
BUSINESS & ECONOMICS / Finance
COMPUTERS / Data Processing
Wirtschaft
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=499146
work_keys_str_mv AT neaguadrian oracle11gantihackerscookbook