


Detailed introduction of Shangguan Oracle's video tutorials from getting started to mastering
Oracle has always been a leader in the database field due to its good data security and stability. "Shangguan Oracle Getting Started to Mastering Video Tutorial" is designed for database developers and introduces Oracle from scratch. In addition to basic SQL syntax, it also brings you custom functions and stored procedures that are necessary in the database development process.
Course playback address: http://www.php.cn/course/549.html
The teacher’s teaching style:
The teacher’s lectures are simple, clear, layer-by-layer analysis, interlocking, rigorous argumentation, rigorous structure, and use the logical power of thinking to attract students’ attention Strength, use reason to control the classroom teaching process. By listening to the teacher's lectures, students not only learn knowledge, but also receive thinking training, and are also influenced and infected by the teacher's rigorous academic attitude
The more difficult point in this video is the security of the database:
Database security control
User identification and identification
User identification and identification are the most important features provided by the system. Outer security measures. The method is for the system to provide a certain way for users to identify their identity or name. Every time a user requests to enter the system, the system will verify it and provide machine usage rights only after passing the authentication.
User Identification (User Identification)
Use a user name or user identification number (UID) to indicate the user's identity. The system internally records the identification of all legal users, and the system identifies whether this user is a legal user.
Password
In order to further verify the user, the system often requires the user to enter a password. The system checks the password to authenticate the user.
Access Control
The most important point of database security is to ensure that only qualified users are authorized to access the database, and at the same time, all unauthorized users cannot access the data. This is mainly through Implementation of database access control mechanism.
The access control mechanism mainly consists of two parts:
1. Define user permissions and register user permissions in the data dictionary.
2. Legal authority check
Includes discretionary access control (DAC) and mandatory access control (MAC). The simple definition of these two methods is:
In In the autonomous access control method, users have different access rights to different database objects, and different users also have different rights to the same object, and users can also transfer their access control rights to other users. Discretionary access control is therefore very flexible.
In the mandatory access control method, each database object is marked with a certain confidentiality level, and each user is also granted a certain level of license. For any user, only users with legal licenses can access, so the forced access method is stricter.
Discretionary Access Control (DAC) method
User permissions mainly consist of two elements: database objects and operation types. In a database system, defining access permissions is called authorization.
1. Security functions of database
a) User identification and authentication. User identification and authentication provide the outermost layer of security protection measures. The method is that the system provides certain methods for users to Identify your name or identity. All legal user IDs are recorded internally in the system. Every time you request to enter the system, the system will verify it. Only after passing the authentication will the right to use the machine be provided
b) Access control : Database access control is to ensure that only qualified users can access the database, while preventing all unauthorized people from accessing the data. The database system provides two access control mechanisms, autonomous access control and strong access control. In the autonomous access control method, users have different permissions on different database objects, and different users also have different permissions on the same object. Permissions, strong access control, mean that the database is divided into certain secret levels. Each user is granted a certain level of license. Only legal users can access. Strong access control is equivalent to the previous mandatory access control model (MAC ), autonomous access control is equivalent to the previous autonomous access control (DAC), see Access Control Technology
for detailsThe database mode includes the creation of database SCHEMA, basic table TABLE, view VIEW and index INDEX. Autonomous access control mainly grants permissions to users through the GRANT statement and revokes permissions through the REVOKE statement. ###
The above is the detailed content of Detailed introduction of Shangguan Oracle's video tutorials from getting started to mastering. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Oracle View Encryption allows you to encrypt data in the view, thereby enhancing the security of sensitive information. The steps include: 1) creating the master encryption key (MEk); 2) creating an encrypted view, specifying the view and MEk to be encrypted; 3) authorizing users to access the encrypted view. How encrypted views work: When a user querys for an encrypted view, Oracle uses MEk to decrypt data, ensuring that only authorized users can access readable data.

Uninstall method for Oracle installation failure: Close Oracle service, delete Oracle program files and registry keys, uninstall Oracle environment variables, and restart the computer. If the uninstall fails, you can uninstall manually using the Oracle Universal Uninstall Tool.

Deleting all data in Oracle requires the following steps: 1. Establish a connection; 2. Disable foreign key constraints; 3. Delete table data; 4. Submit transactions; 5. Enable foreign key constraints (optional). Be sure to back up the database before execution to prevent data loss.

Oracle Invalid numeric errors may be caused by data type mismatch, numeric overflow, data conversion errors, or data corruption. Troubleshooting steps include checking data types, detecting digital overflows, checking data conversions, checking data corruption, and exploring other possible solutions such as configuring the NLS_NUMERIC_CHARACTERS parameter and enabling data verification logging.

Solutions to Oracle cannot be opened include: 1. Start the database service; 2. Start the listener; 3. Check port conflicts; 4. Set environment variables correctly; 5. Make sure the firewall or antivirus software does not block the connection; 6. Check whether the server is closed; 7. Use RMAN to recover corrupt files; 8. Check whether the TNS service name is correct; 9. Check network connection; 10. Reinstall Oracle software.

Oracle database paging uses ROWNUM pseudo-columns or FETCH statements to implement: ROWNUM pseudo-columns are used to filter results by row numbers and are suitable for complex queries. The FETCH statement is used to get the specified number of first rows and is suitable for simple queries.

The method to solve the Oracle cursor closure problem includes: explicitly closing the cursor using the CLOSE statement. Declare the cursor in the FOR UPDATE clause so that it automatically closes after the scope is ended. Declare the cursor in the USING clause so that it automatically closes when the associated PL/SQL variable is closed. Use exception handling to ensure that the cursor is closed in any exception situation. Use the connection pool to automatically close the cursor. Disable automatic submission and delay cursor closing.

In Oracle, the FOR LOOP loop can create cursors dynamically. The steps are: 1. Define the cursor type; 2. Create the loop; 3. Create the cursor dynamically; 4. Execute the cursor; 5. Close the cursor. Example: A cursor can be created cycle-by-circuit to display the names and salaries of the top 10 employees.
