Abstract
As you might imagine, the subject of this chapter could fill a whole book, or even several, if I tried to cover the entire scope of Oracle security. Instead, I will cover the essentials, and also some particular aspects of Oracle security to which a programmer can relate. An example of essential Oracle security is using roles and granting privileges to those roles. An example of a programmer’s extension of Oracle security is secure application roles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2011 David Coffin
About this chapter
Cite this chapter
Coffin, D. (2011). Oracle Database Security. In: Expert Oracle and Java Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-3832-4_2
Download citation
DOI: https://doi.org/10.1007/978-1-4302-3832-4_2
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-3831-7
Online ISBN: 978-1-4302-3832-4
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)