How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Notes on Public Synonyms → If you create a public synonym and it subsequently has dependent tables or dependent valid user … the same schema as the dependent objects. Take care not to create a public synonym with the same … PUBLIC. synonym Specify the name of the synonym to be created. Caution: The functional maximum length … statement. Alternatively, you
Public Method Description → Table 4-91 OracleParameter Public Methods Public Method Description Clone Creates a shallow copy of … copy of an OracleParameter object. Declaration // C# public object Clone(); Return Value An … resources allocated for an OracleParameter object. Declaration // C# public void Dispose(); Implements
Public Method Description → Table 4-60 OracleErrorCollection Public Methods Public Method Description CopyTo Inherited from
Public Key Cryptography and the Public Key/Private Key Pair → Public-key cryptography requires that entities that want to communicate in a secure manner, possess … . Security credentials consist of a public/private key pair, a "user" certificate, a certificate chain, and … aspect of key management. In a multiuser environment, secure key distribution may be difficult; public … key cryptography
11.1 Oracle Public Key Infrastructure → Oracle public key infrastructure (PKI) is used by Oracle Enterprise Security Manager, LDAP -enabled … Wallets store digital certificates, trust points, and private keys used in public key applications
11.2 Windows Public Key Infrastructure → This section describes Windows public key infrastructure. This section contains these topics
Private Versus Public Items in Packages → package. Any PL/SQL code can reference the exception invalid_salary. Such items are called public. To … the same session. The value is lost when the session ends. To make the items public, place them in
Public Key Infrastructure in an Oracle Environment → A public key infrastructure (PKI) is a substrate of network components that provide a security … network entities can access its security services, which use public-key cryptography, on an as-needed … basis. Oracle provides a complete PKI that is based on RSA Security, Inc., Public-Key Cryptography
Public-Key Cryptography Standards (PKCS) Support → representatives from industry, academia, and government, a family of basic cryptography standards called Public … interoperability between computer systems that use public-key technology to secure data across intranets
Public Key Infrastructure Credentials Management Tools → The security provided by a public key infrastructure (PKI) depends on how effectively you store
5.11 New Names for SQLLIB Public Functions → standard SQLLIB public function is thread-safe and accepts the runtime context as the first argument. For … that you will write. Table 5-3 lists all the SQLLIB public functions and their corresponding syntax
8 The Public Key Infrastructure Approach to Security → Public key infrastructure (PKI) is a set of policies and procedures to establish a secure … industry standard approach to security implementation. Introduction Public Key Cryptography and the … Public Key/Private Key Pair Secure Credentials: Certificate-Based Authentication in PKI Storing
Example 5: Creating a Public Current User Database Link → The following example connects to the local database as the connected user and creates a public … link to the sales database (using its net service name sldb ). The following statement creates a public … current user database link: CONNECT bart/simpson@local CREATE PUBLIC DATABASE LINK sales.division3
3.3 Protecting the PL/SQL Procedures Granted to PUBLIC → Every database package granted to public can be directly executed using the following URL: http … protect the execution of the PL/SQL procedures granted to PUBLIC in the database. These procedures
Example 1: Creating a Public Fixed User Database Link → The following statements connect to the local database as jane and create a public fixed user … : CONNECT jane/doe@local CREATE PUBLIC DATABASE LINK sales.division3.acme.com CONNECT TO scott
Example 2: Creating a Public Fixed User Shared Database Link → The following example connects to the local database as dana and creates a public link to the sales … scott and authenticates this user as scott: CONNECT dana/sculley@local CREATE SHARED PUBLIC
Example 4: Creating a Public Connected User Shared Database Link → The following example connects to the local database as neil and creates a shared, public link to … /password of crazy/horse. The following statement creates a public, connected user, shared database link … : CONNECT neil/young@local CREATE SHARED PUBLIC DATABASE LINK sales.division3.acme.com AUTHENTICATED BY
Public Key Infrastructure Components in an Oracle Environment → Public key infrastructure (PKI) components in an Oracle environment include the following … notarized. The CA publishes its own certificate, which includes its public key. Each network entity … when an entity's public key is signed by a trusted certificate authority (CA). A certificate ensures … that an entity's identification
Granting to and Revoking from the User Group PUBLIC → Privileges and roles can also be granted to and revoked from the user group PUBLIC. Because PUBLIC … is accessible to every database user, all privileges and roles granted to PUBLIC are accessible to … PUBLIC only if every database user requires the privilege or role. This recommendation reinforces the … accomplish
Example 3: Creating a Public Connected User Database Link → The following example connects to the local database as larry and creates a public link to the … database with the net service name sldb: CONNECT larry/oracle@local CREATE PUBLIC DATABASE LINK redwood … sales.division3.acme.com does not have emp as a table, view, or (public) synonym, an error will be returned. CONNECT fox/mulder@local