When granting roles to users we need to remember two things: Any child role of the granted role is granted to the user as well (and this is hierarchical) You
When granting roles to users we need to remember two things: Any child role of the granted role is granted to the user as well (and this is hierarchical) You
As you know, Oracle Open World is over (for me at least), and one of the major topics there was Oracle 12cR2 (or 12.2). It looks like a really cool
In the previous parts I talked about security of the application and infrastructure layer of database security. This will be the last post in the series and I want to
In the previous parts I talked about database security and the infrastructure part of database security. In this post I will discuss the development aspect of the database.Links to the
The listener is the first contact we make in order to connect to the Oracle database. Therefore, as DBAs, it is also the front-end component we can secure. There are