Applied Oracle Security: Developing Secure Database and Middleware Environments- P2:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | This page intentionally left blank Contents at a Glance PART I Oracle Database Security New Features 1 Security Blueprints and New Thinking . 3 2 Transparent Data Encryption . 21 3 Applied Auditing and Audit Vault . 57 PART II Oracle Database Vault 4 Database Vault Introduction . 93 5 Database Vault Fundamentals . 117 6 Applied Database Vault for Custom Applications . 199 7 Applied Database Vault for Existing Applications .287 PART III Identity Management 8 Architecting Identity Management .357 9 Oracle Identity Manager .385 10 Oracle Directory Services .405 PART IV Applied Security for Oracle APEX and Oracle Business Intelligence 11 Web-centric Security in APEX .433 12 Secure Coding Practices in APEX .461 XI XII Applied Oracle Security 13 Securing Access to Oracle BI . 497 14 Securing Oracle BI Content and Data . 535 A Using the Oracle BI Examples . 579 Index . .