This document describes how you can configure security for Oracle Berkeley DB.
This book is aimed at the developer who wishes to write a secure application which incorporates Oracle Berkeley DB.
Scripting on this page enhances content navigation, but does not change the content in any way.