[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Madrid, 2011 - Google Patents

Oracle 10g/11g Data and Database Management Utilities: LITE

Madrid, 2011

Document ID
3604008003648111653
Author
Madrid H
Publication year

External Links

Snippet

This practical, hands-on book is specifically designed to improve the way you use and work with Oracle database utilities. The material has been carefully selected from Packts fuller Oracle 10g/11g Data and Database Management Utilities title. The full edition of the book …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments

Similar Documents

Publication Publication Date Title
US11770381B2 (en) Managing security groups for data instances
Awaysheh et al. Next-generation big data federation access control: A reference model
JP6625636B2 (en) Identity infrastructure as a service
Bhathal et al. Big Data: Hadoop framework vulnerabilities, security issues and attacks
GB2458568A (en) System for enforcing security policies on electronic files
US20140075571A1 (en) Role-oriented database record field security model
Gorman et al. Introducing Microsoft SQL Server 2019: Reliability, scalability, and security both on premises and in the cloud
Kuzminykh et al. Analysis of encryption key management systems: strengths, weaknesses, opportunities, threats
Buecker et al. Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
US20070079364A1 (en) Directory-secured packages for authentication of software installation
US20100030805A1 (en) Propagating information from a trust chain processing
Raekow et al. On-demand software licence provisioning in grid and cloud computing
Carter et al. Securing SQL Server
US8479281B2 (en) Authentication management methods and media
Ngo et al. Serverless computing architecture security and quality analysis for back-end development
Madrid Oracle 10g/11g Data and Database Management Utilities: LITE
Del Vecchio et al. Evaluating Grid portal security
Wright Protecting Oracle Database 12c
Lamouchi Adding Anti-Disaster Layers
Gharajeh Security issues and privacy challenges of NoSQL databases
Isakov Exam Ref 70-764 Administering a SQL Database Infrastructure
Velthuis New authentication mechanism using certificates for big data analytic tools
Cabianca Configuring Access
Scales et al. IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN Volume Controller Security Feature Checklist
Feller A study of Oracle Cloud Infrastructure: Demonstration of the vulnerability or reliability of certain services through penetration attacks