Find a copy online
Links to this item
Find a copy in the library
Finding libraries that hold this item...
|Material Type:||Document, Internet resource|
|Document Type:||Internet Resource, Computer File|
|All Authors / Contributors:||Sideris Courseware Corp,|
|Target Audience:||Scholarly & Professional|
|Description:||1 online resource|
Threats to data security abound and are increasing in sophistication and frequency. Organizations have both an ethical and oftentimes a legal responsibility to understand the countermeasures available, to compare these against those threats to which they are exposed, and to properly apply such countermeasures. This training course module considers how encryption technology should, and should not, be employed within an Oracle database environment in response to known threats and risks. It will also discuss other best security practices which pertain to application security, host system configuration and the database installation. This course provides helpful information for the certification exam as an ORACLE 11G CERTIFIED MASTER (OCM).