155 - R

Team-Fly    

  
Oracle Security
By William Heney, Marlene Theriault
Table of Contents


[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

RC4 encryption algorithms 
RDBMS  [See operating system Oracle]
READ privilege 
RECOVER commands 
recovering data  [See backup and recovery]
recovery catalog 
Recovery Manager (Oracle8) 
Recovery Manager utility (OEM) 
redo log files  2nd  3rd 
    groups of 
REFERENCES privilege  2nd 
remote database access 
remote database administration 
REMOTE_LOGIN_PASSWORD variable  2nd 
REMOTE_OS_AUTHENT parameter  2nd 
remove utility script (OSS) 
RENAME privilege 
Replication Manager utility (OEM)  2nd 
reporting audit data 
repository, OEM 
repository, OSS  2nd  3rd 
    access to 
requests for user accounts 
resolving synonyms, ownership and 
Resource Management events 
resource profiles  [See system resource profiles]
RESOURCE role  2nd  3rd 
    auditing 
RESOURCE_LIMIT parameter 
resource_map table 
resources
    disk space  [See disk storage]
    memory  [See memory]
resources for further reading 
restoring/revoking credentials 
resynchronization 
reusing passwords 
revoking certificates of authority 
ROLE_ROLE_PRIVS view  2nd 
ROLE_SYS_PRIVS view  2nd 
ROLE_TAB_PRIVS view  2nd 
roles  2nd  [See also privileges]3rd 
    adding system privileges to 
    assigning to users 
    built-in 
    credit card system (example) 
    default  2nd  3rd 
        list of 
    determining privileges of 
    global, OSS and 
    granted to roles (ROLE_ROLE_PRIVS view) 
    granting and defining, script for 
    listing all (DBA_ROLES view) 
    listing all granted (DBA_ROLE_PRIVS view) 
    naming  2nd  3rd 
    passwords for  2nd 
     role-object access matrix (example) 
    segmenting database authority (example) 
    standards for 
    stored program privileges and 
    system privileges of (ROLE_SYS_PRIVS) 
    table privileges of (ROLE_TAB_PRIVS view) 
rollback segments 
row-level security  2nd 
    credit card system (example) 
RSA cryptographic algorithms  2nd 


Team-Fly    
Top


Oracle Security
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net