This presentation is a review of the numerous features available to secure access to the
listener's configuration, decide who gets to connect to your databases and from where, and
prevent outsiders from connecting to your databases or obtaining information about them.
It will include demonstrations of some of those features, built from real-world experiences of
that crucial subject. Attendees will leave with
- technical know-how on the listener
- examples of listener security configuration
- undocumented tips learnt from real-world experience