142 - E

Team-Fly    

  
Oracle Security
By William Heney, Marlene Theriault
Table of Contents


[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

EBU (Enterprise Backup Utility)  2nd 
editing control files 
educating users about policies 
electronic references 
EMP_AD0 trigger (example)  2nd 
EMP_AU0 trigger (example)  2nd 
EMP_BI0 trigger (example)  2nd 
employees , standards for 
encryption 
    ANO algorithms for 
    cryptography, in general 
    DES algorithms  2nd 
    passwords and 
    PL/SQL wrapper 
    RSA cryptographic algorithms  2nd 
enforcing security policies 
Enterprise Authorization role 
Enterprise Backup Utility (EBU)  2nd 
enterprise tables, credit card system (example) 
errors
    Fault Management events 
    OSS utility problems 
Event Management System (OEM) 
EXECUTE file permission 
EXECUTE privilege  2nd 
EXECUTE_CATALOG_ROLE role  2nd 
EXP_FULL_DATABASE role 
expiring passwords  2nd 
EXPORT utility 
exports, database 
exports, scheduled 
externally identified accounts 


Team-Fly    
Top


Oracle Security
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net