作者:刘小宝0201 | 来源:互联网 | 2018-06-04 10:01
ContentsExpandAll·CollapseAllListofExamplesListofFiguresListofTablesTitleandCopyrightInformationPreface1IntroductiontoJavainOracleDatabase2JavaApplicationsonOracleDatabase3CallingJavaMethodsinOracleDa
Contents Expand All ·Collapse All List of Examples List of Figures List of Tables Title and Copyright Information Preface 1 Introduction to Java in Oracle Database 2 Java Applications on Oracle Database 3 Calling Java Methods in Oracle Da
Contents
Expand All ·
Collapse All
List of Examples
List of Figures
List of Tables
Title and Copyright Information
Preface
1 Introduction to Java in Oracle Database
2 Java Applications on Oracle Database
3 Calling Java Methods in Oracle Database
- Invoking Java Methods
- Using PL/SQL Wrappers
- JNI Support
- Utilizing SQLJ and JDBC with Java in the Database
- JDBC
- SQLJ
- Example Comparing JDBC and SQLJ
- Complete SQLJ Example
- SQLJ Strong Typing Paradigm
- Translating a SQLJ Program
- Running a SQLJ Program in the Server
- Converting a Client Application to Run on the Server
- Interacting with PL/SQL
- Using Command-Line Interface
- Using the Client-Side Stub
- Debugging Server Applications
- How To Tell You Are Running on the Server
- Redirecting Output on the Server
- Calling Java in the Database Directly
4 Java Installation and Configuration
5 Developing Java Stored Procedures
6 Publishing Java Classes With Call Specifications
7 Calling Stored Procedures
8 Java Stored Procedures Application Example
9 Oracle Database Java Application Performance
10 Security for Oracle Database Java Applications
- Network Connection Security
- Database Contents and Oracle JVM Security
- Java2 Security
- Setting Permissions
- Fine-Grain Definition for Each Permission
- General Permission Definition Assigned to Roles
- Debugging Permissions
- Permission for Loading Classes
- Database Authentication Mechanisms
- Secure Use of Runtime.exec Functionality in Oracle Database
11 Schema Objects and Oracle JVM Utilities
12 Database Web Services
A DBMS_JAVA Package
B Classpath Extensions and User Classloaded Metadata
Index
================================================================================================
Oracle? Database Security Guide
11g Release 2 (11.2)
E36292-04 |

Home |

Book List |

Contents |

Index |

Master Index |

Contact Us |
|

Previous |

Next |
|
PDF ·
Mobi ·
ePub |
5 Managing Security for Application Developers
This chapter contains:
-
About Application Security Policies
-
Considerations for Using Application-Based Security
-
Securing Passwords in Application Design
-
Managing Application Privileges
-
Creating Secure Application Roles to Control Access to Applications
-
Associating Privileges with User Database Roles
-
Protecting Database Objects by Using Schemas
-
Managing Object Privileges in an Application
-
Parameters for Enhanced Security of Database Communication
注释:oracle官方文档之数据库用户使用oracle组件(还有第三方应用程序??)时所需的权限规定