153 - P

Team-Fly    

  
Oracle Security
By William Heney, Marlene Theriault
Table of Contents


[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

packages 
packets 
parameters, INIT.ORA 
parameters, table 
PASSWORD command 
PASSWORD_GRACE_TIME parameter 
PASSWORD_LIFE_TIME parameter 
PASSWORD_LOCK_TIME parameter 
PASSWORD_REUSE_MAX parameter 
PASSWORD_REUSE_TIME parameter 
PASSWORD_VERIFY_FUNCTION parameter 
passwords  2nd  3rd  4th 
    aging and expiring  2nd 
    built-in user accounts 
        dbsnmp user 
        demo user 
        scott user 
        sys user  2nd 
        system user 
    built-in-user accounts
        po8 user 
    changing  2nd 
    composition and complexity features 
    data encryption and 
    database connections without 
    files for 
    guesses as unsuccessful logons  
    for network listeners 
    OSS accounts 
    password files 
    profile parameters for 
    for roles  2nd 
    standards for 
    swapping 
performance  [See also disk storage; memory]
    auditing drain on  2nd 
    auditing to measure 
    client/server architecture 
    Oracle Performance Packs 
    Performance Management events 
    segmenting application processing 
    trigger speed 
    views and 
period of validity, certificate 
permissions, file 
    configuration file 
    control files 
    EXECUTE privilege 
    initialization file 
    redo log files 
physical components of Oracle systems 
PL/SQL commands, disabling 
PL/SQL source code wrapper 
plaintext 
plans, security 
    auditing  2nd 
        process of auditing 
        purging audit data 
        storing audit information 
        types of auditing 
    backup and recovery 
    defined 
     employees  
    index and checklist for 
    involving users in 
    key components (list) 
    managing 
    need for 
    OSS for  [See OSS]
    passwords 
    reviewing 
    roles 
    user accounts 
    usernames 
    views 
platforms 
po8 user account 
policies, security 
    defined 
    enforcing 
    involving users in 
    need for 
pre-employment tracking 
primary keys, updateable views and 
privacy  2nd 
private keys 
private synonyms 
PRIVATE_SGA parameter 
privileges  2nd  [See also roles]3rd 
     administrator-level , auditing 
    audit tables 
    auditing  2nd  3rd  4th 
    credit card system (example) 
    determining which are granted 
    for employees 
    granted to roles 
        ROLE_SYS_PRIVS view 
        ROLE_TAB_PRIVS view 
    listing all granted
        DBA_SYS_PRIVS view 
        DBA_TAB_PRIVS view 
    procedures 
    roles and  [See roles]
    SQL, disabling 
    synonyms 
    system vs. object privileges 
    table ownership 
procedures  2nd 
    executing 
    ownership and privileges 
procedures, security
    auditing 
    backup and recovery 
    defined 
    involving users in 
processing, segmenting 
product profiles  2nd  [See also profiles]3rd  4th  5th 
PRODUCT_PRIVS view 
PRODUCT_PROFILE table 
profile$ table 
profiles  2nd  3rd 
    DBA_PROFILES view 
    product profiles  2nd  3rd  4th 
    system resource profiles  2nd  3rd  4th  5th 
        DEFAULT profile 
profname$ table 
programs  2nd  3rd  [See also triggers]
promoted employees 
public keys 
public user account ( group )  2nd  3rd 
    location transparency  2nd 
    synonyms 
PUPBLD.SQL script 
purging audit information 


Team-Fly    
Top


Oracle Security
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net