Security

  • Sean Dillon
  • Christopher Beck
  • Thomas Kyte
  • Joel Kallman
  • Howard Rogers

Abstract

Up until this point, we have learned about the large variety of database objects you can create in an Oracle database, as well as how to exploit them in an application. However, if we have no way of making our database objects and applications secure, then their usefulness will be severely limited. If, for example, we developed an application to manage Human Resource information, which allowed any individual to either view all employee salaries, or, even worse, update any employee’s salary, it is doubtful that it would prove popular! In any basic database application, there is usually some subset of information available to the public, some information only available to the author, and a full set of information that is exclusively available to a group of privileged individuals.

Keywords

Titanium Nickel Chromium Cobalt Cadmium 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Apress 2002

Authors and Affiliations

  • Sean Dillon
  • Christopher Beck
  • Thomas Kyte
  • Joel Kallman
  • Howard Rogers

There are no affiliations available

Personalised recommendations