Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used to investigate a database breach. You will learn the measures to put in place now to make it harder for an attack to be successful, and to aid in the detection and investigation of future attacks. You will know how to bring together tools and methods to create a holistic approach and investigation when an event occurs, helping you to be confident of your ability to react correctly and responsibly to threats against your organization’s data. What You'll Learn: Detect when breaches have or may have occurred React with confidence using an organized plan Determine whether a suspected breach is real Determine the scope of data that has been compromised Preserve evidence for possible criminal prosecutions Put in place measures to aid future investigations.
Computer science. --- Database management. --- Computer Science. --- Database Management. --- Security. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used to investigate a database breach. You will learn the measures to put in place now to make it harder for an attack to be successful, and to aid in the detection and investigation of future attacks. You will know how to bring together tools and methods to create a holistic approach and investigation when an event occurs, helping you to be confident of your ability to react correctly and responsibly to threats against your organization’s data. What You'll Learn: Detect when breaches have or may have occurred React with confidence using an organized plan Determine whether a suspected breach is real Determine the scope of data that has been compromised Preserve evidence for possible criminal prosecutions Put in place measures to aid future investigations.
Production management --- Information systems --- Computer. Automation --- veiligheid (mensen) --- database management --- computerbeveiliging
Choose an application
This book is an anthology of effective database management techniques representing the collective wisdom of the OakTable Network. With an emphasis upon performance but also branching into security, national language, and other issues the book helps you deliver the most value for your company's investment in Oracle Database technologies. You'll learn to effectively plan for and monitor performance, to troubleshoot systematically when things go wrong, and to manage your database rather than letting it manage you.
Choose an application
This book is an anthology of effective database management techniques representing the collective wisdom of the OakTable Network. With an emphasis upon performance—but also branching into security, national language, and other issues—the book helps you deliver the most value for your company’s investment in Oracle Database technologies. You’ll learn to effectively plan for and monitor performance, to troubleshoot systematically when things go wrong, and to manage your database rather than letting it manage you.
Listing 1 - 4 of 4 |
Sort by
|