Designing an IAM framework with Oracle identity and access management suite
| Main Author: | Scheidel, Jeff (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York
McGraw-Hill
c2010
|
| Subjects: | |
| Online Access: | McGraw Hill |
Similar Items
Oracle PL/SQL programming
by: Urman, Scott
Published: (1996)
by: Urman, Scott
Published: (1996)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Mastering Oracle7 & client/server computing
by: Bobrowski, Steven M.
Published: (1996)
by: Bobrowski, Steven M.
Published: (1996)
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Applied Oracle security developing secure database and middleware environments
by: Knox, David (David C.)
Published: (2010)
by: Knox, David (David C.)
Published: (2010)
Implementing NAP and NAC security technologies the complete guide to network access control
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
Access control and identity management
by: Chapple, Mike
Published: (2021)
by: Chapple, Mike
Published: (2021)
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Security information and event management (SIEM) implementation
by: Miller, David 1959 November 5-
Published: (2011)
by: Miller, David 1959 November 5-
Published: (2011)
Internet and Intranet security
by: Oppliger, Rolf
Published: (2002)
by: Oppliger, Rolf
Published: (2002)
Cyber security culture counteracting cyber threats through organizational learning and training
by: Trim, Peter R. J., et al.
Published: (2013)
by: Trim, Peter R. J., et al.
Published: (2013)
Computer security
by: Galley, Shari Mendelson
Published: (1987)
by: Galley, Shari Mendelson
Published: (1987)
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Wireshark for security professionals using wireshark and the metasploit framework
by: Bullock, Jessey, et al.
Published: (2017)
by: Bullock, Jessey, et al.
Published: (2017)
Industrial network security securing critical infrastructure networks for smart grid, scada, and other industrial control systems
by: Knapp, Eric D., et al.
Published: (2015)
by: Knapp, Eric D., et al.
Published: (2015)
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)
by: Wong, Caroline
Published: (2012)
How to secure and audit Oracle 10g and 11g
by: Ben-Natan, Ron
Published: (2009)
by: Ben-Natan, Ron
Published: (2009)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS
by: Macaulay, Tyson, et al.
Published: (2012)
by: Macaulay, Tyson, et al.
Published: (2012)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Oracle collaboration suite handbook
by: Zapar, Ron
Published: (2007)
by: Zapar, Ron
Published: (2007)
Computational network science : an algorithmic approach
by: Hexmoor, Henry
Published: (2015)
by: Hexmoor, Henry
Published: (2015)
Web commerce security design and development
by: Nahari, Hadi, et al.
Published: (2011)
by: Nahari, Hadi, et al.
Published: (2011)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
24 deadly sins of software security programming flaws and how to fix them
by: Howard, Michael 1965-, et al.
Published: (2010)
by: Howard, Michael 1965-, et al.
Published: (2010)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Introduction to security and network forensics
by: Buchanan, William J. 1926-2005
Published: (2011)
by: Buchanan, William J. 1926-2005
Published: (2011)
Computer and cyber security principles, algorithm, applications, and perspectives
Understanding security issues
by: Donaldson, Scott E., et al.
by: Donaldson, Scott E., et al.
Security and resilience in intelligent data-centric systems and communication networks
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Similar Items
-
Oracle PL/SQL programming
by: Urman, Scott
Published: (1996) -
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011) -
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007) -
Mastering Oracle7 & client/server computing
by: Bobrowski, Steven M.
Published: (1996) -
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)