Title | Summary | File | |
---|---|---|---|
Oracle E-Business Suite Security Quick Reference |
A quick reference guide for securing the Oracle E-Business Suite (EBS). The guide includes information on (1) default EBS application users... |
Whitepapers and Presentations | File |
Oracle Critical Patch Update - October 2011 - Database Impact |
An overview of the Oracle Critical Patch Update (CPU) for October 2011 and the impact on the Oracle Database. This presentation includes a... |
Security Resources | File |
Oracle Critical Patch Update - October 2011 - E-Business Suite Impact |
A review of the Oracle Critical Patch Update (CPU) for October 2011 and the impact on the Oracle E-Business. This presentation includes a... |
Security Resources | File |
Oracle Critical Patch Update - July 2011 - Database Impact |
An overview of the Oracle Critical Patch Update (CPU) for July 2011 and the impact on the Oracle Database. This presentation includes a discussion... |
Security Resources | File |
Oracle Critical Patch Update - July 2011 - E-Business Suite Impact |
A review of the Oracle Critical Patch Update (CPU) for July 2011 and the impact on the Oracle E-Business. This presentation includes a discussion... |
Security Resources | File |
Real-life Database Security Mistakes |
IOUG COLLABORATE 2011 - You did everything by the book followed the database security checklists and implemented security best practices but one... |
Security Resources | File |
Real-life Oracle E-Business Suite Security Mistakes |
OAUG COLLABORATE 2011 - You did everything by the book, followed the database security checklists, and implemented security best practices, but... |
Security Resources | File |
Real World Database Auditing |
IOUG 2009 COLLABORATE Presentation - Database auditing is one of the most misunderstood and neglected database features, however, database... |
Security Resources | File |
Spoofing Oracle Session Information |
Oracle Database session information includes database user name, operating system user name, host, terminal, IP address, module, program,... |
Security Resources | File |
Oracle Database Listener Security Guide |
A guide to properly securing the Oracle Database Listener. Integrigy Consulting has found the Database Listener to be one of the most frequently... |
Security Resources | File |