Contents Expand All ·Collapse All List of Examples List of Figures List of Tables Title and Copyright Information Preface 1 Introduction to Java in Oracle Database 2 Java Applications on Oracle Database 3 Calling Java Methods in Oracle Da
Contents
Expand All ·
Collapse All
List of Examples
List of Figures
List of Tables
Title and Copyright Information
Preface
1 Introduction to Java in Oracle Database
2 Java Applications on Oracle Database
3 Calling Java Methods in Oracle Database
-
Invoking Java Methods
- Using PL/SQL Wrappers
- JNI Support
-
Utilizing SQLJ and JDBC with Java in the Database
- JDBC
- SQLJ
- Example Comparing JDBC and SQLJ
- Complete SQLJ Example
- SQLJ Strong Typing Paradigm
- Translating a SQLJ Program
- Running a SQLJ Program in the Server
- Converting a Client Application to Run on the Server
- Interacting with PL/SQL
- Using Command-Line Interface
- Using the Client-Side Stub
- Debugging Server Applications
- How To Tell You Are Running on the Server
- Redirecting Output on the Server
- Calling Java in the Database Directly
4 Java Installation and Configuration
5 Developing Java Stored Procedures
6 Publishing Java Classes With Call Specifications
7 Calling Stored Procedures
8 Java Stored Procedures Application Example
9 Oracle Database Java Application Performance
10 Security for Oracle Database Java Applications
- Network Connection Security
-
Database Contents and Oracle JVM Security
- Java2 Security
-
Setting Permissions
- Fine-Grain Definition for Each Permission
- General Permission Definition Assigned to Roles
- Debugging Permissions
- Permission for Loading Classes
- Database Authentication Mechanisms
- Secure Use of Runtime.exec Functionality in Oracle Database
11 Schema Objects and Oracle JVM Utilities
12 Database Web Services
A DBMS_JAVA Package
B Classpath Extensions and User Classloaded Metadata
Index
================================================================================================
Oracle? Database Security Guide
11g Release 2 (11.2)
E36292-04 |
Home
|
Book List
|
Contents
|
Index
|
Master Index
|
Contact Us
|
|
Previous
|
Next
|
|
PDF ·
Mobi ·
ePub |
5 Managing Security for Application Developers
This chapter contains:
-
About Application Security Policies
-
Considerations for Using Application-Based Security
-
Securing Passwords in Application Design
-
Managing Application Privileges
-
Creating Secure Application Roles to Control Access to Applications
-
Associating Privileges with User Database Roles
-
Protecting Database Objects by Using Schemas
-
Managing Object Privileges in an Application
-
Parameters for Enhanced Security of Database Communication
注释:oracle官方文档之数据库用户使用oracle组件(还有第三方应用程序??)时所需的权限规定
Statement:The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn