Around the world, hackers have made it their life's mission to break
through doors that were thought to be securely locked and guarded. These
people demonstrate their profound knowledge of network protocols,
operating systems and programming languages to outsmart entire
development teams. If they want in and there is a hole, they will find
it! When that happens, the last line of defense is to protect the data
at its source.
Oracle database offers a variety of ways to protect data. This
presentation will explore the options and establish awareness of what is
possible, reasons for applying each of the features, potential overhead
and how to do it, including use of new features introduced in 12c.
Become a member of ODTUG to gain access to more than 12,500 files in our technical database.
- Not a member? Click through to the topic of interest to browse a list of available presentations.
- Already a member? Log-in here to access the full database
Click here to see the Full Techincal Resource Database