158 - U

Team-Fly    

  
Oracle Security
By William Heney, Marlene Theriault
Table of Contents


[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

UFI ( User Friendly Interface) 
UNIX systems
    CONNECT INTERNAL command 
    EBU (Enterprise Backup Utility)  2nd 
    file-level interaction protection 
     group membership 
    SQL.BSQ, CATALOG.SQL file locations 
    swapping passwords 
    trusted shells  
UNLIMITED profile parameter 
UNLIMITED tablespace quota  2nd 
unlocking user accounts 
updating
    capturing table data (example) 
        after-update trigger  2nd 
         before-insert trigger  2nd 
    data dictionary 
    tracking updates 
    UPDATE privilege  2nd 
    views 
Usenet newsgroups as resources  2nd 
user groups, Oracle 
user$ table 
User_astatus_map table 
USER_AUDIT_OBJECT view 
USER_AUDIT_SESSION view 
USER_AUDIT_STATEMENT view 
USER_AUDIT_TRAIL view 
USER_OBJ_AUDIT_OPTS view 
USER_PRIVS view 
USER_PROFILE table 
USER_ROLE_PRIVS view 
USER_TABLES view 
users  2nd 
    account creation privileges 
    account standards 
    auditing to detect intruders  2nd 
    authenticating  [See authentication]
    broadcasting message to 
    checking on 
    classes of 
    default accounts  2nd  3rd 
    determining privileges of 
     employees , standards for 
    global, OSS and 
    granting/defining roles, script for 
    groups  [See roles]
    hiding tables and owner from (example) 
    identified externally accounts 
    impersonation 
    information on (DBA_USERS) 
    involving in network security 
    locking accounts  2nd 
    maintaining user accounts 
    operating system accounts 
    OPS$ accounts 
    oracle_security_service(_admin) 
    oracle_security_service, oracle_security_admin 
    passwords  [See passwords]
    private information about  2nd 
    privileges  [See authorization privileges]
    profiles  [See system resource profiles]
    querying 
     requests for accounts, handling 
    resource limits for  2nd 
    roles  [See roles]
    security user account 
    segmenting database authority (example) 
    state of, documenting 
    tracking 
    types of accounts 
    username selection  2nd 
UTL_FILE functions 
UTLPWDMG.SQL script 


Team-Fly    
Top


Oracle Security
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net