Search Results for Oracle (Computer file). - Narrowed by: Database security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dOracle$002b$002528Computer$002bfile$002529.$0026qf$003dSUBJECT$002509Subject$002509Database$002bsecurity.$002509Database$002bsecurity.$0026pe$003dd$00253A$0026ps$003d300?
2024-11-17T22:43:12Z
Practical Oracle Security Your Unauthorized Guide to Relationial Database Security.
ent://SD_ILS/0/SD_ILS:147226
2024-11-17T22:43:12Z
2024-11-17T22:43:12Z
Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491983">http://www.sciencedirect.com/science/book/9781597491983</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Oracle Security Your Unauthorized Guide to Relationial Database Security.
ent://SD_ILS/0/SD_ILS:112192
2024-11-17T22:43:12Z
2024-11-17T22:43:12Z
Author ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491983">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing an IAM framework with Oracle identity and access management suite
ent://SD_ILS/0/SD_ILS:293289
2024-11-17T22:43:12Z
2024-11-17T22:43:12Z
Author Scheidel, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle database 11g DBA handbook
ent://SD_ILS/0/SD_ILS:293348
2024-11-17T22:43:12Z
2024-11-17T22:43:12Z
Author Bryla, Bob. Loney, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-database-11g-dba-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Oracle security developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:293376
2024-11-17T22:43:12Z
2024-11-17T22:43:12Z
Author Knox, David (David C.) Gaetjen, Scott. Jahangir, Hamza. Muth, Tyler. Sack, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Databases demystified
ent://SD_ILS/0/SD_ILS:294120
2024-11-17T22:43:12Z
2024-11-17T22:43:12Z
Author Oppel, Andrew J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/databases-demystified-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>