Title Summary File
Oracle Critical Patch Update - July 2011 - E-Business Suite Impact

A review of the Oracle Critical Patch Update (CPU) for July 2011 and the impact on the Oracle E-Business. This presentation includes a discussion...

Security Resources File
Credit Cards and Oracle: How to Comply with PCI-DSS

IOUG COLLABORATE 2011 - Credit card data breaches are headline news thus organizations must properly protect credit card data or risk being...

Security Resources File
Real-life Database Security Mistakes

IOUG COLLABORATE 2011 - You did everything by the book followed the database security checklists and implemented security best practices but one...

Security Resources File
Real-life Oracle E-Business Suite Security Mistakes

OAUG COLLABORATE 2011 - You did everything by the book, followed the database security checklists, and implemented security best practices, but...

Security Resources File
Real World Database Auditing

IOUG 2009 COLLABORATE Presentation - Database auditing is one of the most misunderstood and neglected database features, however, database...

Security Resources File
Spoofing Oracle Session Information

Oracle Database session information includes database user name, operating system user name, host, terminal, IP address, module, program,...

Security Resources File
AppSentry Listener Security Check Tool
AppSentry Listener Security Check is a tool to check the security configuration of the Oracle...
Security Resources File
Building an Audit Trail in an Oracle Applications Environment

Sarbanes-Oxley’s section 404 requires a company’s key systems be audited. However, many companies have 'unauditable' systems and don’t even know...

Security Resources File
Hashing Credit Card Numbers: Unsafe Application Practices

Cryptographic hash functions seem to be an ideal method for protecting and securely storing credit card numbers in e-commerce and payment...

Security Resources File
Oracle Database Listener Security Guide

A guide to properly securing the Oracle Database Listener. Integrigy Consulting has found the Database Listener to be one of the most frequently...

Security Resources File

Pages