Title Summary File
Real-life Database Security Mistakes

IOUG COLLABORATE 2011 - You did everything by the book followed the database security checklists and implemented security best practices but one...

Security Resources File
Real-life Oracle E-Business Suite Security Mistakes

OAUG COLLABORATE 2011 - You did everything by the book, followed the database security checklists, and implemented security best practices, but...

Security Resources File
Real World Database Auditing

IOUG 2009 COLLABORATE Presentation - Database auditing is one of the most misunderstood and neglected database features, however, database...

Security Resources File
Spoofing Oracle Session Information

Oracle Database session information includes database user name, operating system user name, host, terminal, IP address, module, program,...

Security Resources File
Oracle Database Listener Security Guide

A guide to properly securing the Oracle Database Listener. Integrigy Consulting has found the Database Listener to be one of the most frequently...

Security Resources File
Integrigy Guide to Auditing and Logging in Oracle E-Business Suite

Most Oracle E-Business Suite implementations do not fully take advantage of the auditing and logging features. These features are sophisticated...

Security Resources File

Pages