Team-Fly |
Oracle Security By William Heney, Marlene Theriault | |
Table of Contents | |
[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] EBU (Enterprise Backup Utility) 2nd editing control files educating users about policies electronic references EMP_AD0 trigger (example) 2nd EMP_AU0 trigger (example) 2nd EMP_BI0 trigger (example) 2nd employees , standards for encryption ANO algorithms for cryptography, in general DES algorithms 2nd passwords and PL/SQL wrapper RSA cryptographic algorithms 2nd enforcing security policies Enterprise Authorization role Enterprise Backup Utility (EBU) 2nd enterprise tables, credit card system (example) errors Fault Management events OSS utility problems Event Management System (OEM) EXECUTE file permission EXECUTE privilege 2nd EXECUTE_CATALOG_ROLE role 2nd EXP_FULL_DATABASE role expiring passwords 2nd EXPORT utility exports, database exports, scheduled externally identified accounts |
Team-Fly |
Top |