Index

A

  1. Addressing vulnerabilities

  2. Application DBAs

  3. Application Program Interfaces (APIs)

  4. Application vs . Cloud DBA

  5. Artificial Intelligence (AI)

  6. Auditing

  7. Augmented Reality (AR)

  8. Authentication

  9. Authorization

  10. Automation DBAs

    1. code automation

    2. dependencies

    3. monitoring

    4. schedule

    5. security

    6. tasks

    7. test plans

B

  1. Big data

  2. Business intelligence

C

  1. Capacity planning, Cloud DBA

  2. Change management

  3. Chief Cloud Officer (CCO)

  4. Chief Data Officer (CDO)

  5. Chief Security Officer (CSO)

  6. Cisco Virtual Networking

  7. Cloud Appliance

  8. Cloud computing

  9. Cloud databases

  10. Cloud database tasks

  11. Cloud DBAs

    1. vs . applications

    2. capacity planning

    3. Cloud Control

    4. creation of

    5. data analysis

    6. data migration

    7. vs . DBaaS

    8. discovering

    9. evaluation

    10. security features

    11. tasks

    12. tools

    13. types of

    14. workload analysis

  12. Cloud Engineered System

  13. Cloud providers

  14. Cloud security

  15. Cloud Service Models

  16. Cloud therapy

  17. Code automation

  18. Common Vulnerability Scoring System (CVSS)

  19. Container database (CDB)

  20. Cyber Security Framework

D

  1. Database administration (DBA)

    1. application

    2. automation

    3. career paths

    4. defined

    5. high availability

    6. infratructure

    7. manageability

    8. recovery

    9. skill set

    10. soft skills

    11. storage

    12. system

    13. technical skills

  2. Database administrators

    1. job satisfaction

    2. skill development

  3. Database as a Service (DBaaS)

    1. APIs

    2. vs . cloud DBA

    3. definition

    4. design and advantages

  4. Database creation

  5. Database Machine Administrator (DMA)

    1. appliances

    2. automation

    3. Cloud Engineered System

    4. control of

    5. design and architecture decisions

    6. evaluation

    7. Exadata Database Machine

    8. SuperCluster

  6. Database objects

  7. Database platform

  8. Database security

    1. addressing vulnerabilities

    2. auditing

    3. DBA teams

    4. evaluation

    5. reducing risk

    6. reporting

    7. security learning

    8. security planning

    9. security team

  9. Database servers

  10. Database technology

    1. data types

    2. storage

  11. Data collection

  12. Data flows

  13. Data integrations

  14. Data management

  15. Data migrations

  16. Data modeling

  17. Data ownership

  18. Data professionals

  19. Data protection

  20. Data quality

    1. classification

    2. development process

    3. and governance

    4. MDM

  21. Data retention

  22. Data Warehouse

  23. Data workflows

  24. Disk operations

  25. Disruptors

    1. security

    2. social networking

    3. technology

E, F

  1. Enterprise Cloud Control

  2. Enterprise database

  3. Enterprise thinking

  4. Exadata Database Machine

  5. Extract, load, transform (ETL) processes

G

  1. General Data Protection Regulation (GDPR)

H

  1. Hybrid clouds

I, J, K

  1. Identity theft

  2. Infrastructure as a Service (IaaS)

  3. Interpersonal skills

L

  1. Leadership

    1. developing skills

    2. team building

    3. team goals

M

  1. Massively Parallel Processing (MPP) databases

  2. Master Data Management (MDM)

  3. Mentoring

  4. Microsoft SQL Server

  5. Mobile Data Traffic

N

  1. National Vulnerability Database

O

  1. On-demand services

  2. Oracle 12c

  3. Oracle Cloud

  4. Oracle Cloud Manager

  5. Oracle Data Integrator (ODI)

  6. Oracle Enterprise Cloud Control

  7. Oracle Enterprise Manager

  8. Oracle Exadata engineered systems

  9. Oracle machine offerings

  10. Organizational chart

P, Q

  1. Password management

  2. Performance tuning

  3. Platform as a Service (PaaS)

  4. Pluggable databases (PDB)

  5. Privacy

  6. Private clouds

  7. Public cloud

R

  1. Real Application Clusters (RAC)

  2. Real Application Testing (RAT)

S

  1. Security Information and Event Management (SIEM)

  2. Security learning

  3. Security planning

  4. Security teams

  5. Server OS

  6. Service-level agreements

  7. Service-oriented architecture

  8. Skill learning plan

  9. Social networking

  10. Soft skills

    1. adaptability

    2. communication

    3. documentation

    4. leadership

    5. organizational

    6. relationship building

  11. Software as a Service (SaaS)

  12. Solid State Disks (SSD)

  13. Standardization security in Cloud

  14. SuperCluster

  15. Systems DBA

T

  1. Technical skills

    1. Core vs . Oracle

    2. installs and upgrades

    3. platform-specific

    4. testing and implementation

  2. Test environment

  3. Transformation plan

    1. acquiring

    2. DBA skills

    3. evaluation

    4. planning

U

  1. Unit testing

V

  1. Virtualization

  2. Virtual reality (VR)

  3. Vulnerabilities

    1. addressing

    2. and risks

W, X, Y, Z

  1. Work-life balance

  2. Workload analysis

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset