


Oracle has always been a leader in the database field due to its good data security and stability. "Shangguan Oracle Getting Started to Mastering Video Tutorial" is designed for database developers and introduces Oracle from scratch. In addition to basic SQL syntax, it also brings you custom functions and stored procedures that are necessary in the database development process.
Course playback address: http://www.php.cn/course/549.html
The teacher’s teaching style:
The teacher’s lectures are simple, clear, layer-by-layer analysis, interlocking, rigorous argumentation, rigorous structure, and use the logical power of thinking to attract students’ attention Strength, use reason to control the classroom teaching process. By listening to the teacher's lectures, students not only learn knowledge, but also receive thinking training, and are also influenced and infected by the teacher's rigorous academic attitude
The more difficult point in this video is the security of the database:
Database security control
User identification and identification
User identification and identification are the most important features provided by the system. Outer security measures. The method is for the system to provide a certain way for users to identify their identity or name. Every time a user requests to enter the system, the system will verify it and provide machine usage rights only after passing the authentication.
User Identification (User Identification)
Use a user name or user identification number (UID) to indicate the user's identity. The system internally records the identification of all legal users, and the system identifies whether this user is a legal user.
Password
In order to further verify the user, the system often requires the user to enter a password. The system checks the password to authenticate the user.
Access Control
The most important point of database security is to ensure that only qualified users are authorized to access the database, and at the same time, all unauthorized users cannot access the data. This is mainly through Implementation of database access control mechanism.
The access control mechanism mainly consists of two parts:
1. Define user permissions and register user permissions in the data dictionary.
2. Legal authority check
Includes discretionary access control (DAC) and mandatory access control (MAC). The simple definition of these two methods is:
In In the autonomous access control method, users have different access rights to different database objects, and different users also have different rights to the same object, and users can also transfer their access control rights to other users. Discretionary access control is therefore very flexible.
In the mandatory access control method, each database object is marked with a certain confidentiality level, and each user is also granted a certain level of license. For any user, only users with legal licenses can access, so the forced access method is stricter.
Discretionary Access Control (DAC) method
User permissions mainly consist of two elements: database objects and operation types. In a database system, defining access permissions is called authorization.
1. Security functions of database
a) User identification and authentication. User identification and authentication provide the outermost layer of security protection measures. The method is that the system provides certain methods for users to Identify your name or identity. All legal user IDs are recorded internally in the system. Every time you request to enter the system, the system will verify it. Only after passing the authentication will the right to use the machine be provided
b) Access control : Database access control is to ensure that only qualified users can access the database, while preventing all unauthorized people from accessing the data. The database system provides two access control mechanisms, autonomous access control and strong access control. In the autonomous access control method, users have different permissions on different database objects, and different users also have different permissions on the same object. Permissions, strong access control, mean that the database is divided into certain secret levels. Each user is granted a certain level of license. Only legal users can access. Strong access control is equivalent to the previous mandatory access control model (MAC ), autonomous access control is equivalent to the previous autonomous access control (DAC), see Access Control Technology
for detailsThe database mode includes the creation of database SCHEMA, basic table TABLE, view VIEW and index INDEX. Autonomous access control mainly grants permissions to users through the GRANT statement and revokes permissions through the REVOKE statement. ###
The above is the detailed content of Detailed introduction of Shangguan Oracle's video tutorials from getting started to mastering. For more information, please follow other related articles on the PHP Chinese website!

oracle asm指的是“自动存储管理”,是一种卷管理器,可自动管理磁盘组并提供有效的数据冗余功能;它是做为单独的Oracle实例实施和部署。asm的优势:1、配置简单、可最大化推动数据库合并的存储资源利用;2、支持BIGFILE文件等。

方法:1、利用“select*from user_indexes where table_name=表名”语句查询表中索引;2、利用“select*from all_indexes where table_name=表名”语句查询所有索引。

在Oracle中,可利用lsnrctl命令查询端口号,该命令是Oracle的监听命令;在启动、关闭或重启oracle监听器之前可使用该命令检查oracle监听器的状态,语法为“lsnrctl status”,结果PORT后的内容就是端口号。

在oracle中,可以利用“TO_SINGLE_BYTE(String)”将全角转换为半角;“TO_SINGLE_BYTE”函数可以将参数中所有多字节字符都替换为等价的单字节字符,只有当数据库字符集同时包含多字节和单字节字符的时候有效。

在oracle中,可以利用“drop sequence sequence名”来删除sequence;sequence是自动增加数字序列的意思,也就是序列号,序列号自动增加不能重置,因此需要利用drop sequence语句来删除序列。

在oracle中,可以利用“select ... From all_tab_columns where table_name=upper('表名') AND owner=upper('数据库登录用户名');”语句查询数据库表的数据类型。

方法:1、利用“LOWER(字段值)”将字段转为小写,或者利用“UPPER(字段值)”将字段转为大写;2、利用“REGEXP_LIKE(字符串,正则表达式,'i')”,当参数设置为“i”时,说明进行匹配不区分大小写。

方法:1、利用“alter system set sessions=修改后的数值 scope=spfile”语句修改session参数;2、修改参数之后利用“shutdown immediate – startup”语句重启服务器即可生效。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Atom editor mac version download
The most popular open source editor

Dreamweaver Mac version
Visual web development tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
