Abstract
Chapter 13 builds on the foundational theory of privileged access control (PAC) already described in Chapter 12 by providing a survey of the PAC solutions in the market, followed by a generic analysis of the basic methods of how they work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Paul Wright
About this chapter
Cite this chapter
Wright, P. (2014). Privileged Access Control Methods. In: Protecting Oracle Database 12c. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6212-1_13
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6212-1_13
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6211-4
Online ISBN: 978-1-4302-6212-1
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)