Part II: Identification and Authentication

Chapter List

Chapter 3: Understanding Identification and Authentication
Chapter 4: Connection Pools and Proxy Authentication
Chapter 5: Identity Management and Enterprise Users
Chapter 6: Identification and Authentication for Web Applications



Effective Oracle Database 10g Security by Design
Effective Oracle Database 10g Security by Design
ISBN: 0072231300
EAN: 2147483647
Year: 2003
Pages: 111

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net