Team-Fly |
Oracle Security By William Heney, Marlene Theriault | |
Table of Contents | |
[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] RC4 encryption algorithms RDBMS [See operating system Oracle] READ privilege RECOVER commands recovering data [See backup and recovery] recovery catalog Recovery Manager (Oracle8) Recovery Manager utility (OEM) redo log files 2nd 3rd groups of REFERENCES privilege 2nd remote database access remote database administration REMOTE_LOGIN_PASSWORD variable 2nd REMOTE_OS_AUTHENT parameter 2nd remove utility script (OSS) RENAME privilege Replication Manager utility (OEM) 2nd reporting audit data repository, OEM repository, OSS 2nd 3rd access to requests for user accounts resolving synonyms, ownership and Resource Management events resource profiles [See system resource profiles] RESOURCE role 2nd 3rd auditing RESOURCE_LIMIT parameter resource_map table resources disk space [See disk storage] memory [See memory] resources for further reading restoring/revoking credentials resynchronization reusing passwords revoking certificates of authority ROLE_ROLE_PRIVS view 2nd ROLE_SYS_PRIVS view 2nd ROLE_TAB_PRIVS view 2nd roles 2nd [See also privileges]3rd adding system privileges to assigning to users built-in credit card system (example) default 2nd 3rd list of determining privileges of global, OSS and granted to roles (ROLE_ROLE_PRIVS view) granting and defining, script for listing all (DBA_ROLES view) listing all granted (DBA_ROLE_PRIVS view) naming 2nd 3rd passwords for 2nd role-object access matrix (example) segmenting database authority (example) standards for stored program privileges and system privileges of (ROLE_SYS_PRIVS) table privileges of (ROLE_TAB_PRIVS view) rollback segments row-level security 2nd credit card system (example) RSA cryptographic algorithms 2nd |
Team-Fly |
Top |