Madrid, 2011 - Google Patents
Oracle 10g/11g Data and Database Management Utilities: LITEMadrid, 2011
- Document ID
- 3604008003648111653
- Author
- Madrid H
- Publication year
External Links
Snippet
This practical, hands-on book is specifically designed to improve the way you use and work with Oracle database utilities. The material has been carefully selected from Packts fuller Oracle 10g/11g Data and Database Management Utilities title. The full edition of the book …
- 239000000463 material 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11770381B2 (en) | Managing security groups for data instances | |
Awaysheh et al. | Next-generation big data federation access control: A reference model | |
JP6625636B2 (en) | Identity infrastructure as a service | |
Bhathal et al. | Big Data: Hadoop framework vulnerabilities, security issues and attacks | |
GB2458568A (en) | System for enforcing security policies on electronic files | |
US20140075571A1 (en) | Role-oriented database record field security model | |
Gorman et al. | Introducing Microsoft SQL Server 2019: Reliability, scalability, and security both on premises and in the cloud | |
Kuzminykh et al. | Analysis of encryption key management systems: strengths, weaknesses, opportunities, threats | |
Buecker et al. | Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 | |
US20070079364A1 (en) | Directory-secured packages for authentication of software installation | |
US20100030805A1 (en) | Propagating information from a trust chain processing | |
Raekow et al. | On-demand software licence provisioning in grid and cloud computing | |
Carter et al. | Securing SQL Server | |
US8479281B2 (en) | Authentication management methods and media | |
Ngo et al. | Serverless computing architecture security and quality analysis for back-end development | |
Madrid | Oracle 10g/11g Data and Database Management Utilities: LITE | |
Del Vecchio et al. | Evaluating Grid portal security | |
Wright | Protecting Oracle Database 12c | |
Lamouchi | Adding Anti-Disaster Layers | |
Gharajeh | Security issues and privacy challenges of NoSQL databases | |
Isakov | Exam Ref 70-764 Administering a SQL Database Infrastructure | |
Velthuis | New authentication mechanism using certificates for big data analytic tools | |
Cabianca | Configuring Access | |
Scales et al. | IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN Volume Controller Security Feature Checklist | |
Feller | A study of Oracle Cloud Infrastructure: Demonstration of the vulnerability or reliability of certain services through penetration attacks |