Ing. David Solnař
Implementing Basic Database Security Using Basic and Strong User Authentication Configuring Global User Authentication Using Proxy Authentication Using Privileges and Roles Using Privilege Analysis Using Application Contexts Implementing Virtual Private Database Implementing Oracle Label Security Redacting Data Using Oracle Data Masking Using Transparent Sensitive Data Protection Encrypting with DBMS_CRYPTO Package Using Transparent Data Encryption Using Unified Audit Using Fine-Grained Audit