Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment

Team-Fly    

  
Oracle Security

By William Heney, Marlene Theriault

Table of Contents

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

EBU (Enterprise Backup Utility)  2nd 

editing control files 

educating users about policies 

electronic references 

EMP_AD0 trigger (example)  2nd 

EMP_AU0 trigger (example)  2nd 

EMP_BI0 trigger (example)  2nd 

employees , standards for 

encryption 

    ANO algorithms for 

    cryptography, in general 

    DES algorithms  2nd 

    passwords and 

    PL/SQL wrapper 

    RSA cryptographic algorithms  2nd 

enforcing security policies 

Enterprise Authorization role 

Enterprise Backup Utility (EBU)  2nd 

enterprise tables, credit card system (example) 

errors

    Fault Management events 

    OSS utility problems 

Event Management System (OEM) 

EXECUTE file permission 

EXECUTE privilege  2nd 

EXECUTE_CATALOG_ROLE role  2nd 

EXP_FULL_DATABASE role 

expiring passwords  2nd 

EXPORT utility 

exports, database 

exports, scheduled 

externally identified accounts 


Team-Fly    
Top

Категории