Part II
Security Features, Concepts, and Alternatives
Part II presents methods and Oracle Database features that address the security requirements, threats, and concepts presented in Part I.
This part contains the following chapters:
-
Chapter 4, "Authentication Methods"
-
Chapter 5, "Authorization: Privileges, Roles, Profiles, and Resource Limitations"
-
Chapter 6, "Access Control on Tables, Views, Synonyms, or Rows"
-
Chapter 7, "Security Policies"
-
Chapter 8, "Database Auditing: Security Considerations"