Effective Oracle Database 10g Security by Design
Chapter List
- Chapter 3: Understanding Identification and Authentication
- Chapter 4: Connection Pools and Proxy Authentication
- Chapter 5: Identity Management and Enterprise Users
- Chapter 6: Identification and Authentication for Web Applications