Author: IT Governance Institute
Publisher: ISACA
ISBN: 1933284463
Category : Business
Languages : en
Pages : 284
Book Description
Security, Audit and Control Features PeopleSoft
Author: IT Governance Institute
Publisher: ISACA
ISBN: 1933284463
Category : Business
Languages : en
Pages : 284
Book Description
Publisher: ISACA
ISBN: 1933284463
Category : Business
Languages : en
Pages : 284
Book Description
Security, Audit and Control Features
Author: ISACA
Publisher: ISACA
ISBN: 1604201185
Category : Computers
Languages : en
Pages : 43
Book Description
Publisher: ISACA
ISBN: 1604201185
Category : Computers
Languages : en
Pages : 43
Book Description
Security, Audit and Control Features
Author:
Publisher:
ISBN: 1604201975
Category : Computers
Languages : en
Pages : 52
Book Description
Publisher:
ISBN: 1604201975
Category : Computers
Languages : en
Pages : 52
Book Description
Oracle E-Business, 3rd Edition
Author: Isaca
Publisher: ISACA
ISBN: 1604201061
Category : Technology & Engineering
Languages : en
Pages : 419
Book Description
Publisher: ISACA
ISBN: 1604201061
Category : Technology & Engineering
Languages : en
Pages : 419
Book Description
International Convergence of Capital Measurement and Capital Standards
Author:
Publisher: Lulu.com
ISBN: 9291316695
Category : Bank capital
Languages : en
Pages : 294
Book Description
Publisher: Lulu.com
ISBN: 9291316695
Category : Bank capital
Languages : en
Pages : 294
Book Description
Linux
Author: K. K. Mookhey
Publisher: ISACA
ISBN: 1893209784
Category : Computer security
Languages : en
Pages : 168
Book Description
This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security controls and their audit for security administrators, security professionals and information systems auditors. It provides the following guidance to IT management: * The business and technology drivers for Linux * The vulnerabilities of the Linux operating system * Risk management issues with an action-oriented perspective * Linux security software * How to secure Linux installations to fulfill the control objectives of two well-known standards-COBIT and ISO 17799 * Detailed internal control questionnaires. Call +1.847.253.1545 ext. 401, visit www.isaca.org/bookstore or e-mail [email protected] for more information.
Publisher: ISACA
ISBN: 1893209784
Category : Computer security
Languages : en
Pages : 168
Book Description
This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security controls and their audit for security administrators, security professionals and information systems auditors. It provides the following guidance to IT management: * The business and technology drivers for Linux * The vulnerabilities of the Linux operating system * Risk management issues with an action-oriented perspective * Linux security software * How to secure Linux installations to fulfill the control objectives of two well-known standards-COBIT and ISO 17799 * Detailed internal control questionnaires. Call +1.847.253.1545 ext. 401, visit www.isaca.org/bookstore or e-mail [email protected] for more information.
Oracle Security
Author: Marlene Theriault
Publisher: O'Reilly Media
ISBN: 9781565924505
Category : Computer security
Languages : en
Pages : 0
Book Description
Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases. Oracle security has many facets: Establishing an organization's security policy and plan Protecting system files and passwords Controlling access to database objects (tables, views, rows, columns, etc.) Building appropriate user profiles, roles, and privileges Monitoring system access via audit trails Oracle Securitydescribes how these basic database security features are implemented and provides many practical strategies for securing Oracle systems and databases. It explains how to use the Oracle Enterprise Manager and Oracle Security Server to enhance your site's security, and it touches on such advanced security features as encryption, Trusted Oracle, and various Internet and World Wide Web protection strategies. A table of contents follows: Preface Part I: Security in an Oracle System Oracle and Security Oracle System Files Oracle Database Objects The Oracle Data Dictionary Default Roles and User Accounts Profiles, Passwords, and Synonyms Part II: Implementing Security Developing a Database Security Plan Installing and Starting Oracle Developing a Simple Security Application Developing an Audit Plan Developing a Sample Audit Application Backing Up and Recovering a Database Using the Oracle Enterprise Manager Maintaining User Accounts Part III: Enhanced Oracle Security Using the Oracle Security Server Using the Internet and the Web Using Extra-Cost Options Appendix A. References
Publisher: O'Reilly Media
ISBN: 9781565924505
Category : Computer security
Languages : en
Pages : 0
Book Description
Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases. Oracle security has many facets: Establishing an organization's security policy and plan Protecting system files and passwords Controlling access to database objects (tables, views, rows, columns, etc.) Building appropriate user profiles, roles, and privileges Monitoring system access via audit trails Oracle Securitydescribes how these basic database security features are implemented and provides many practical strategies for securing Oracle systems and databases. It explains how to use the Oracle Enterprise Manager and Oracle Security Server to enhance your site's security, and it touches on such advanced security features as encryption, Trusted Oracle, and various Internet and World Wide Web protection strategies. A table of contents follows: Preface Part I: Security in an Oracle System Oracle and Security Oracle System Files Oracle Database Objects The Oracle Data Dictionary Default Roles and User Accounts Profiles, Passwords, and Synonyms Part II: Implementing Security Developing a Database Security Plan Installing and Starting Oracle Developing a Simple Security Application Developing an Audit Plan Developing a Sample Audit Application Backing Up and Recovering a Database Using the Oracle Enterprise Manager Maintaining User Accounts Part III: Enhanced Oracle Security Using the Oracle Security Server Using the Internet and the Web Using Extra-Cost Options Appendix A. References
Auditing Oracle E-Business Suite: Common Issues
Author: Jeffrey T. Hare, CPA CISA CIA
Publisher: Lulu.com
ISBN: 1329529766
Category : Computers
Languages : en
Pages : 194
Book Description
Renowned author, Jeffrey T.Hare, CPA CISA CIA, presents the most common issues from his experience implementing and auditing Oracle E-Business Suite. This book provides practical and easy to understand audit procedures supported by an Internal Controls Questionnaire and SQL scripts. The book is a must for internal and external auditors who have to audit Oracle's E-Business Suite software.
Publisher: Lulu.com
ISBN: 1329529766
Category : Computers
Languages : en
Pages : 194
Book Description
Renowned author, Jeffrey T.Hare, CPA CISA CIA, presents the most common issues from his experience implementing and auditing Oracle E-Business Suite. This book provides practical and easy to understand audit procedures supported by an Internal Controls Questionnaire and SQL scripts. The book is a must for internal and external auditors who have to audit Oracle's E-Business Suite software.
Implementing Database Security and Auditing
Author: Ron Ben Natan
Publisher: Elsevier
ISBN: 0080470645
Category : Computers
Languages : en
Pages : 433
Book Description
This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to an "internals level. There are many sections which outline the "anatomy of an attack – before delving into the details of how to combat such an attack. Equally important, you will learn about the database auditing landscape – both from a business and regulatory requirements perspective as well as from a technical implementation perspective.* Useful to the database administrator and/or security administrator - regardless of the precise database vendor (or vendors) that you are using within your organization.* Has a large number of examples - examples that pertain to Oracle, SQL Server, DB2, Sybase and even MySQL.. * Many of the techniques you will see in this book will never be described in a manual or a book that is devoted to a certain database product.* Addressing complex issues must take into account more than just the database and focusing on capabilities that are provided only by the database vendor is not always enough. This book offers a broader view of the database environment - which is not dependent on the database platform - a view that is important to ensure good database security.
Publisher: Elsevier
ISBN: 0080470645
Category : Computers
Languages : en
Pages : 433
Book Description
This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to an "internals level. There are many sections which outline the "anatomy of an attack – before delving into the details of how to combat such an attack. Equally important, you will learn about the database auditing landscape – both from a business and regulatory requirements perspective as well as from a technical implementation perspective.* Useful to the database administrator and/or security administrator - regardless of the precise database vendor (or vendors) that you are using within your organization.* Has a large number of examples - examples that pertain to Oracle, SQL Server, DB2, Sybase and even MySQL.. * Many of the techniques you will see in this book will never be described in a manual or a book that is devoted to a certain database product.* Addressing complex issues must take into account more than just the database and focusing on capabilities that are provided only by the database vendor is not always enough. This book offers a broader view of the database environment - which is not dependent on the database platform - a view that is important to ensure good database security.
Practical Oracle E-Business Suite
Author: Syed Zaheer
Publisher: Apress
ISBN: 1484214226
Category : Computers
Languages : en
Pages : 793
Book Description
Learn to build and implement a robust Oracle E-Business Suite system using the new release, EBS 12.2. This hands-on, real-world guide explains the rationale for using an Oracle E-Business Suite environment in a business enterprise and covers the major technology stack changes from EBS version 11i through R12.2. You will learn to build up an EBS environment from a simple single-node installation to a complex multi-node high available setup. Practical Oracle E-Business Suite focuses on release R12.2, but key areas in R12.1 are also covered wherever necessary. Detailed instructions are provided for the installation of EBS R12.2 in single and multi-node configurations, the logic and methodology used in EBS patching, and cloning of EBS single-node and complex multi-node environments configured with RAC. This book also provides information on FMW used in EBS 12.2, as well as performance tuning and EBS 12.2 on engineered system implementations. What You Will Learn:/bbr/pdivp/pulliUnderstand Oracle EBS software and the underlying technology stack componentsbr/liliInstall/configure Oracle E-Business Suite R12.2 in simple and HA complex setupsbr/liliManage Oracle EBS 12.2br/liliUse online patching (adop) for Installation of Oracle EBS patchesbr/liliClone an EBS environment in simple and complex configurationsbr/liliPerform and tune Oracle EBS in all layers (Application/DB/OS/NW)br/liliSecure E-Business Suite R12.2br/li/ul/divbrbWho This Book Is For:/bp/pp/pp/pp/pp/pp/p Developers, data architects, and data scientists looking to integrate the most successful big data open stack architecture and how to choose the correct technology in every layer
Publisher: Apress
ISBN: 1484214226
Category : Computers
Languages : en
Pages : 793
Book Description
Learn to build and implement a robust Oracle E-Business Suite system using the new release, EBS 12.2. This hands-on, real-world guide explains the rationale for using an Oracle E-Business Suite environment in a business enterprise and covers the major technology stack changes from EBS version 11i through R12.2. You will learn to build up an EBS environment from a simple single-node installation to a complex multi-node high available setup. Practical Oracle E-Business Suite focuses on release R12.2, but key areas in R12.1 are also covered wherever necessary. Detailed instructions are provided for the installation of EBS R12.2 in single and multi-node configurations, the logic and methodology used in EBS patching, and cloning of EBS single-node and complex multi-node environments configured with RAC. This book also provides information on FMW used in EBS 12.2, as well as performance tuning and EBS 12.2 on engineered system implementations. What You Will Learn:/bbr/pdivp/pulliUnderstand Oracle EBS software and the underlying technology stack componentsbr/liliInstall/configure Oracle E-Business Suite R12.2 in simple and HA complex setupsbr/liliManage Oracle EBS 12.2br/liliUse online patching (adop) for Installation of Oracle EBS patchesbr/liliClone an EBS environment in simple and complex configurationsbr/liliPerform and tune Oracle EBS in all layers (Application/DB/OS/NW)br/liliSecure E-Business Suite R12.2br/li/ul/divbrbWho This Book Is For:/bp/pp/pp/pp/pp/pp/p Developers, data architects, and data scientists looking to integrate the most successful big data open stack architecture and how to choose the correct technology in every layer