Lige nu: Prøv 1 måned til kun 9 kr.!

Start tilbuddet

Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Prøv gratis
DK - Details page - Device banner - 894x1036

Oracle Database 12c Security Cookbook

Sprog
Engelsk
Format
Kategori

Fakta

Tags

    Andre kan også lide...

    1. Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Karl Lane
    2. Offensive Security Using Python: A hands-on guide to offensive tactics and threat mitigation using practical strategies Manindar Mohan
    3. Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework Charles Bihis
    4. Instant Oracle GoldenGate: A concise and clear step-by-step guide to get you quickly started with Oracle GoldenGate Tony Bruzzese
    5. An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments Kushantha Gunawardana
    6. Instant PostgreSQL Backup and Restore How-to: A step-by-step guide to backing up and restoring your database using safe, efficient, and proven recipes Shaun M. Thomas
    7. Oracle Advanced PL/SQL Developer Professional Guide: Master advanced PL/SQL concepts along with plenty of example questions for 1Z0-146 examination with this book and ebook Saurabh K. Gupta
    8. Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Cloud Mirko Gilioli
    9. Oracle Autonomous Database in Enterprise Architecture: Utilize Oracle Cloud Infrastructure Autonomous Databases for better consolidation, automation, and security Rashmi Panda
    10. The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout