Effective Oracle Database 10g Security by Design provides all the information you need to develop and deploy secure database applications. The entire security cycle is covered--from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.
Assess database vulnerabilities and develop effective security policies
Preserve user identity with in-depth analyses of JDBC connection pools, proxy authentication, and client identifiers
Manage database users from a central directory without sacrificing security
Lock down database access using secure application roles
Leverage application and database security within Oracles Identity Management infrastructure
Validate user privileges by using simple views and scripts
Protect individual data elements by using the new Oracle DBMS_CRYPTO package
Exploit database views to provide row-level and column-level fine-grained access controls
Enforce need-to-know access and data privacy with Virtual Private Database and Oracle Label Security
Ensure user accountability with Oracle fine-grained Auditing
http://rapidshare.com/files/6862495/I0072231300.rar
http://rapidshare.com/files/6862495/I0072231300.rar