Effective Oracle Database 10g Security by Design

Chapter List

Chapter 3: Understanding Identification and Authentication
Chapter 4: Connection Pools and Proxy Authentication
Chapter 5: Identity Management and Enterprise Users
Chapter 6: Identification and Authentication for Web Applications

Категории