Skip Headers
Oracle® Database Security Guide
10g Release 2 (10.2)

Part Number B14266-08
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

Part I

Overview of Security Considerations and Requirements

Part I presents fundamental concepts of data security requirements and threats that pertain to connecting to a database, accessing and altering tables, and using applications. In addition, security checklists are provided for DBAs and application developers, which cover installation preparation, database administration best practices, and recommendations for developing secure applications.

This part contains the following chapters:

This part also contains high-level security checklists for DBAs and application developers, covering preparations for installation, best practices for administration, and recommended practices for developing secure applications. References are included to the explanations and alternatives presented in Part II and the examples described in Part III.