Title | Summary | File | |
---|---|---|---|
Oracle Critical Patch Update - July 2011 - E-Business Suite Impact |
A review of the Oracle Critical Patch Update (CPU) for July 2011 and the impact on the Oracle E-Business. This presentation includes a discussion... |
Security Resources | File |
Credit Cards and Oracle: How to Comply with PCI-DSS |
IOUG COLLABORATE 2011 - Credit card data breaches are headline news thus organizations must properly protect credit card data or risk being... |
Security Resources | File |
Real-life Database Security Mistakes |
IOUG COLLABORATE 2011 - You did everything by the book followed the database security checklists and implemented security best practices but one... |
Security Resources | File |
Real-life Oracle E-Business Suite Security Mistakes |
OAUG COLLABORATE 2011 - You did everything by the book, followed the database security checklists, and implemented security best practices, but... |
Security Resources | File |
Real World Database Auditing |
IOUG 2009 COLLABORATE Presentation - Database auditing is one of the most misunderstood and neglected database features, however, database... |
Security Resources | File |
Spoofing Oracle Session Information |
Oracle Database session information includes database user name, operating system user name, host, terminal, IP address, module, program,... |
Security Resources | File |
AppSentry Listener Security Check Tool |
AppSentry Listener Security Check is a tool to check the security configuration of the Oracle... |
Security Resources | File |
Building an Audit Trail in an Oracle Applications Environment |
Sarbanes-Oxley’s section 404 requires a company’s key systems be audited. However, many companies have 'unauditable' systems and don’t even know... |
Security Resources | File |
Hashing Credit Card Numbers: Unsafe Application Practices |
Cryptographic hash functions seem to be an ideal method for protecting and securely storing credit card numbers in e-commerce and payment... |
Security Resources | File |
Oracle Database Listener Security Guide |
A guide to properly securing the Oracle Database Listener. Integrigy Consulting has found the Database Listener to be one of the most frequently... |
Security Resources | File |