146 - I

Team-Fly    

  
Oracle Security
By William Heney, Marlene Theriault
Table of Contents


[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

identified externally accounts 
IDENTIFIED EXTERNALLY option  2nd 
IDENTIFIED GLOBALLY AS clause 
identity (corporate)  2nd  [See also authentication; certificates of authority]
IDLE_TIME parameter 
image (cold) backups  
image copies  2nd 
IMP_FULL_DATABASE role 
impersonation  2nd  3rd 
import command 
IMPORT utility, passwords and 
imports, scheduled 
incremental database exports 
incremental datafile backups 
index for tables 
INDEX privilege  2nd 
INIT.ORA file  2nd  3rd 
    setting parameters 
INITIAL parameter (STORAGE) 
initialization file  2nd  3rd 
    setting up parameters 
INSERT privilege  2nd 
inserts , tracking  2nd 
installing Oracle  2nd 
installing SQL*Net 
instance 
Instance Manager utility (OEM)  2nd 
instantiation 
INSTEAD OF condition 
internal user account, password for 
Internet  [See networking]2nd  [See networking]
intersection tables 
intranets   2nd  3rd 
intruders 
    auditing databases to detect  2nd 
    impersonation 
    password guessing 
    protecting Oracle system from 
IP addresses
    access controlled by 
    storing in cookies 


Team-Fly    
Top


Oracle Security
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net