Home Database Mysql Tutorial Detailed introduction of Shangguan Oracle's video tutorials from getting started to mastering

Detailed introduction of Shangguan Oracle's video tutorials from getting started to mastering

Sep 01, 2017 am 11:00 AM
oracle proficient video

Oracle has always been a leader in the database field due to its good data security and stability. "Shangguan Oracle Getting Started to Mastering Video Tutorial" is designed for database developers and introduces Oracle from scratch. In addition to basic SQL syntax, it also brings you custom functions and stored procedures that are necessary in the database development process.

Detailed introduction of Shangguan Oracles video tutorials from getting started to mastering

Course playback address: http://www.php.cn/course/549.html

The teacher’s teaching style:

The teacher’s lectures are simple, clear, layer-by-layer analysis, interlocking, rigorous argumentation, rigorous structure, and use the logical power of thinking to attract students’ attention Strength, use reason to control the classroom teaching process. By listening to the teacher's lectures, students not only learn knowledge, but also receive thinking training, and are also influenced and infected by the teacher's rigorous academic attitude

The more difficult point in this video is the security of the database:

Database security control

User identification and identification

User identification and identification are the most important features provided by the system. Outer security measures. The method is for the system to provide a certain way for users to identify their identity or name. Every time a user requests to enter the system, the system will verify it and provide machine usage rights only after passing the authentication.

User Identification (User Identification)

Use a user name or user identification number (UID) to indicate the user's identity. The system internally records the identification of all legal users, and the system identifies whether this user is a legal user.

Password

In order to further verify the user, the system often requires the user to enter a password. The system checks the password to authenticate the user.

Access Control

The most important point of database security is to ensure that only qualified users are authorized to access the database, and at the same time, all unauthorized users cannot access the data. This is mainly through Implementation of database access control mechanism.

The access control mechanism mainly consists of two parts:

1. Define user permissions and register user permissions in the data dictionary.

2. Legal authority check

Includes discretionary access control (DAC) and mandatory access control (MAC). The simple definition of these two methods is:

In In the autonomous access control method, users have different access rights to different database objects, and different users also have different rights to the same object, and users can also transfer their access control rights to other users. Discretionary access control is therefore very flexible.

In the mandatory access control method, each database object is marked with a certain confidentiality level, and each user is also granted a certain level of license. For any user, only users with legal licenses can access, so the forced access method is stricter.

Discretionary Access Control (DAC) method

User permissions mainly consist of two elements: database objects and operation types. In a database system, defining access permissions is called authorization.

1. Security functions of database

a) User identification and authentication. User identification and authentication provide the outermost layer of security protection measures. The method is that the system provides certain methods for users to Identify your name or identity. All legal user IDs are recorded internally in the system. Every time you request to enter the system, the system will verify it. Only after passing the authentication will the right to use the machine be provided

b) Access control : Database access control is to ensure that only qualified users can access the database, while preventing all unauthorized people from accessing the data. The database system provides two access control mechanisms, autonomous access control and strong access control. In the autonomous access control method, users have different permissions on different database objects, and different users also have different permissions on the same object. Permissions, strong access control, mean that the database is divided into certain secret levels. Each user is granted a certain level of license. Only legal users can access. Strong access control is equivalent to the previous mandatory access control model (MAC ), autonomous access control is equivalent to the previous autonomous access control (DAC), see Access Control Technology

for details

                                                                                                                                                                                       

         The database mode includes the creation of database SCHEMA, basic table TABLE, view VIEW and index INDEX. Autonomous access control mainly grants permissions to users through the GRANT statement and revokes permissions through the REVOKE statement. ###

The above is the detailed content of Detailed introduction of Shangguan Oracle's video tutorials from getting started to mastering. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to encrypt oracle view How to encrypt oracle view Apr 11, 2025 pm 08:30 PM

Oracle View Encryption allows you to encrypt data in the view, thereby enhancing the security of sensitive information. The steps include: 1) creating the master encryption key (MEk); 2) creating an encrypted view, specifying the view and MEk to be encrypted; 3) authorizing users to access the encrypted view. How encrypted views work: When a user querys for an encrypted view, Oracle uses MEk to decrypt data, ensuring that only authorized users can access readable data.

How to uninstall Oracle installation failed How to uninstall Oracle installation failed Apr 11, 2025 pm 08:24 PM

Uninstall method for Oracle installation failure: Close Oracle service, delete Oracle program files and registry keys, uninstall Oracle environment variables, and restart the computer. If the uninstall fails, you can uninstall manually using the Oracle Universal Uninstall Tool.

How to delete all data from oracle How to delete all data from oracle Apr 11, 2025 pm 08:36 PM

Deleting all data in Oracle requires the following steps: 1. Establish a connection; 2. Disable foreign key constraints; 3. Delete table data; 4. Submit transactions; 5. Enable foreign key constraints (optional). Be sure to back up the database before execution to prevent data loss.

How to check invalid numbers of oracle How to check invalid numbers of oracle Apr 11, 2025 pm 08:27 PM

Oracle Invalid numeric errors may be caused by data type mismatch, numeric overflow, data conversion errors, or data corruption. Troubleshooting steps include checking data types, detecting digital overflows, checking data conversions, checking data corruption, and exploring other possible solutions such as configuring the NLS_NUMERIC_CHARACTERS parameter and enabling data verification logging.

What to do if the oracle can't be opened What to do if the oracle can't be opened Apr 11, 2025 pm 10:06 PM

Solutions to Oracle cannot be opened include: 1. Start the database service; 2. Start the listener; 3. Check port conflicts; 4. Set environment variables correctly; 5. Make sure the firewall or antivirus software does not block the connection; 6. Check whether the server is closed; 7. Use RMAN to recover corrupt files; 8. Check whether the TNS service name is correct; 9. Check network connection; 10. Reinstall Oracle software.

How to paginate oracle database How to paginate oracle database Apr 11, 2025 pm 08:42 PM

Oracle database paging uses ROWNUM pseudo-columns or FETCH statements to implement: ROWNUM pseudo-columns are used to filter results by row numbers and are suitable for complex queries. The FETCH statement is used to get the specified number of first rows and is suitable for simple queries.

How to solve the problem of closing oracle cursor How to solve the problem of closing oracle cursor Apr 11, 2025 pm 10:18 PM

The method to solve the Oracle cursor closure problem includes: explicitly closing the cursor using the CLOSE statement. Declare the cursor in the FOR UPDATE clause so that it automatically closes after the scope is ended. Declare the cursor in the USING clause so that it automatically closes when the associated PL/SQL variable is closed. Use exception handling to ensure that the cursor is closed in any exception situation. Use the connection pool to automatically close the cursor. Disable automatic submission and delay cursor closing.

How to create cursors in oracle loop How to create cursors in oracle loop Apr 12, 2025 am 06:18 AM

In Oracle, the FOR LOOP loop can create cursors dynamically. The steps are: 1. Define the cursor type; 2. Create the loop; 3. Create the cursor dynamically; 4. Execute the cursor; 5. Close the cursor. Example: A cursor can be created cycle-by-circuit to display the names and salaries of the top 10 employees.

See all articles