search
HomeDatabaseMysql TutorialDetailed introduction of Shangguan Oracle's video tutorials from getting started to mastering

Oracle has always been a leader in the database field due to its good data security and stability. "Shangguan Oracle Getting Started to Mastering Video Tutorial" is designed for database developers and introduces Oracle from scratch. In addition to basic SQL syntax, it also brings you custom functions and stored procedures that are necessary in the database development process.

Detailed introduction of Shangguan Oracles video tutorials from getting started to mastering

Course playback address: http://www.php.cn/course/549.html

The teacher’s teaching style:

The teacher’s lectures are simple, clear, layer-by-layer analysis, interlocking, rigorous argumentation, rigorous structure, and use the logical power of thinking to attract students’ attention Strength, use reason to control the classroom teaching process. By listening to the teacher's lectures, students not only learn knowledge, but also receive thinking training, and are also influenced and infected by the teacher's rigorous academic attitude

The more difficult point in this video is the security of the database:

Database security control

User identification and identification

User identification and identification are the most important features provided by the system. Outer security measures. The method is for the system to provide a certain way for users to identify their identity or name. Every time a user requests to enter the system, the system will verify it and provide machine usage rights only after passing the authentication.

User Identification (User Identification)

Use a user name or user identification number (UID) to indicate the user's identity. The system internally records the identification of all legal users, and the system identifies whether this user is a legal user.

Password

In order to further verify the user, the system often requires the user to enter a password. The system checks the password to authenticate the user.

Access Control

The most important point of database security is to ensure that only qualified users are authorized to access the database, and at the same time, all unauthorized users cannot access the data. This is mainly through Implementation of database access control mechanism.

The access control mechanism mainly consists of two parts:

1. Define user permissions and register user permissions in the data dictionary.

2. Legal authority check

Includes discretionary access control (DAC) and mandatory access control (MAC). The simple definition of these two methods is:

In In the autonomous access control method, users have different access rights to different database objects, and different users also have different rights to the same object, and users can also transfer their access control rights to other users. Discretionary access control is therefore very flexible.

In the mandatory access control method, each database object is marked with a certain confidentiality level, and each user is also granted a certain level of license. For any user, only users with legal licenses can access, so the forced access method is stricter.

Discretionary Access Control (DAC) method

User permissions mainly consist of two elements: database objects and operation types. In a database system, defining access permissions is called authorization.

1. Security functions of database

a) User identification and authentication. User identification and authentication provide the outermost layer of security protection measures. The method is that the system provides certain methods for users to Identify your name or identity. All legal user IDs are recorded internally in the system. Every time you request to enter the system, the system will verify it. Only after passing the authentication will the right to use the machine be provided

b) Access control : Database access control is to ensure that only qualified users can access the database, while preventing all unauthorized people from accessing the data. The database system provides two access control mechanisms, autonomous access control and strong access control. In the autonomous access control method, users have different permissions on different database objects, and different users also have different permissions on the same object. Permissions, strong access control, mean that the database is divided into certain secret levels. Each user is granted a certain level of license. Only legal users can access. Strong access control is equivalent to the previous mandatory access control model (MAC ), autonomous access control is equivalent to the previous autonomous access control (DAC), see Access Control Technology

for details

                                                                                                                                                                                       

         The database mode includes the creation of database SCHEMA, basic table TABLE, view VIEW and index INDEX. Autonomous access control mainly grants permissions to users through the GRANT statement and revokes permissions through the REVOKE statement. ###

The above is the detailed content of Detailed introduction of Shangguan Oracle's video tutorials from getting started to mastering. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
什么是oracle asm什么是oracle asmApr 18, 2022 pm 04:16 PM

oracle asm指的是“自动存储管理”,是一种卷管理器,可自动管理磁盘组并提供有效的数据冗余功能;它是做为单独的Oracle实例实施和部署。asm的优势:1、配置简单、可最大化推动数据库合并的存储资源利用;2、支持BIGFILE文件等。

oracle怎么查询所有索引oracle怎么查询所有索引May 13, 2022 pm 05:23 PM

方法:1、利用“select*from user_indexes where table_name=表名”语句查询表中索引;2、利用“select*from all_indexes where table_name=表名”语句查询所有索引。

Oracle怎么查询端口号Oracle怎么查询端口号May 13, 2022 am 10:10 AM

在Oracle中,可利用lsnrctl命令查询端口号,该命令是Oracle的监听命令;在启动、关闭或重启oracle监听器之前可使用该命令检查oracle监听器的状态,语法为“lsnrctl status”,结果PORT后的内容就是端口号。

oracle全角怎么转半角oracle全角怎么转半角May 13, 2022 pm 03:21 PM

在oracle中,可以利用“TO_SINGLE_BYTE(String)”将全角转换为半角;“TO_SINGLE_BYTE”函数可以将参数中所有多字节字符都替换为等价的单字节字符,只有当数据库字符集同时包含多字节和单字节字符的时候有效。

oracle怎么删除sequenceoracle怎么删除sequenceMay 13, 2022 pm 03:35 PM

在oracle中,可以利用“drop sequence sequence名”来删除sequence;sequence是自动增加数字序列的意思,也就是序列号,序列号自动增加不能重置,因此需要利用drop sequence语句来删除序列。

oracle怎么查询数据类型oracle怎么查询数据类型May 13, 2022 pm 04:19 PM

在oracle中,可以利用“select ... From all_tab_columns where table_name=upper('表名') AND owner=upper('数据库登录用户名');”语句查询数据库表的数据类型。

oracle查询怎么不区分大小写oracle查询怎么不区分大小写May 10, 2022 pm 05:45 PM

方法:1、利用“LOWER(字段值)”将字段转为小写,或者利用“UPPER(字段值)”将字段转为大写;2、利用“REGEXP_LIKE(字符串,正则表达式,'i')”,当参数设置为“i”时,说明进行匹配不区分大小写。

Oracle怎么修改sessionOracle怎么修改sessionMay 13, 2022 pm 05:06 PM

方法:1、利用“alter system set sessions=修改后的数值 scope=spfile”语句修改session参数;2、修改参数之后利用“shutdown immediate – startup”语句重启服务器即可生效。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.