[go: up one dir, main page]

Gopal et al. - Google Patents

Oracle Database 2 Day+ Security Guide, 11g Release 2 (11.2) E10575-09

Gopal et al.

View PDF
Document ID
2476988500231423652
Author
Gopal N
Mir R
Mulagund G
Lewis N
Needham P
Owens D
Sonawane S
Surpur A
Tbeileh K
Townsend M
Wahl P
Wang X

External Links

Snippet

Oracle Database 2 Day + Security Guide Page 1 Oracle® Database 2 Day + Security Guide 11g Release 2 (11.2) E10575-09 November 2013 Page 2 Oracle Database 2 Day + Security Guide, 11g Release 2 (11.2) E10575-09 Copyright © 2006, 2013, Oracle and/or its affiliates …
Continue reading at www.uwemahlmann.de (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US7831570B2 (en) Mandatory access control label security
US9049195B2 (en) Cross-domain security for data vault
US20030177376A1 (en) Framework for maintaining information security in computer networks
US8805741B2 (en) Classification-based digital rights management
US10339325B2 (en) Multi-level security model for securing access to encrypted private data
Carter et al. Securing SQL Server
Yesin et al. Ensuring database security with the universal basis of relations
Gopal et al. Oracle Database 2 Day+ Security Guide, 11g Release 2 (11.2) E10575-09
Gopal et al. Oracle Database 2 Day+ Security Guide, 11g Release 2 (11.2) E10575-08
Gopal et al. Oracle Database 2 Day+ Security Guide, 11g Release 2 (11.2) E10575-05
Gopal et al. Oracle Database 2 Day+ Security Guide, 11g Release 1 (11.1) B28337-07
Gopal et al. Oracle Database 2 Day+ Security Guide, 11g Release 1 (11.1) B28337-05
Amer Security of DBMSs
Bottger et al. Oracle Database 2 Day+ Security Guide, 12c Release 1 (12.1) E17609-14
Vileikis The World of Security in MySQL
Shaw et al. Hive security
Jeloka et al. Oracle Database Security Guide 10g Release 2 (10.2) B14266-01
Mulagund et al. Oracle Database Security Guide 10g Release 2 (10.2) B14266-09
Panek Security fundamentals
Moore Oracle Database Security Guide, 10g Release 1 (10.1) Part No. B10773-01 Copyright© 2003 Oracle Corporation. All rights reserved. Primary Authors: Laurel P. Hale, Jeffrey Levinger Contributing Authors: Ruth Baylis, Michele Cyran, John Russell
Anoshin et al. Snowflake Security Overview
Lin Defense In-Depth to Achieve “Unbreakable” Database Security
Browning Security Features in the Teradata Database
Korsakova Security methods and how they are applied in Oracle products
Syalim Controlling Access to Encrypted Databases Using Multipolicy Access Control System