Oracle Security By William Heney, Marlene Theriault
Table of Contents
What This Book Is Not
Often while writing this book we've had to stop and say, "Wait a minute. That's outside the scope of this book." We have tried to hold a clear view from the beginning of what we wanted to present. As we said earlier, our goal is to provide you with the information you need to implement security on your system using only the basic Oracle-standard code.
We did not want to write a "you have to do things this way" book. We have tried to show alternatives and options you can takeor ignorebased on your own company's needs and desires. We've tried to resist the temptation to make this book a larger work that tries to be all things to all people. This book is not a guide to additional products that Oracle or any third-party vendors sell to enhance your system and database security. And, although we include an overview of additional security measures you can use to protect your systems, we are not trying to provide a general guide to system security, nor are we trying to provide all the details you need to operate in a high-security environment. There are many wonderful books that address the specifics of operating system, Internet, web site, and firewall security; see Appendix A for a list of some of these books.