Tutorials to .com

Tutorials to .com » Database » Oracle » Oracle Tutorial

Oracle Tutorial Articles


361: ORACLE fool Manual Part V
ORACLE fool Manual Part V 5 backup and recovery See the contents of all are in Annex 05_backup / under. 5.1 export and import methods See dmp / backup.sh. See the "Tools" on the description of exp and imp Database is more, but in add...

362: Oracle Spatial database management skills
Oracle Spatial database management skills In the Oracle database, DBA can be observed a certain table or view to understand the current use of space, and then decided to make possible adjustments. 1. Tablespace free space Table space by the free-...

363: Quick Start Guide OracleRMAN
Quick Start Guide Oracle RMAN Preface: This article introduces the commonly used method of RMAN, which contains some of his own experience of the author, which basically the entire experiment in the WIN 2K and ORACLE 8.1.6 testing the success of e...

364: Oracle to build the binary file method of indexing
Oracle to build the binary file method of indexing Oracle text can be carried out on the language of the document analysis, the use of a number of ways to find the document, including keywords, the context of inquiry, logical operations, pattern ma...

365: Oracle how to run OS commands directly (I)
Oracle how to run OS commands directly (I) In Oracle 8i often appear to the operating system stored procedure in order to run. In general, the use of Oracle Enterprise Manager can be configured to operate to achieve this objective. However, due to ...

366: Encyclopedia of Oracle database using the cursor
Encyclopedia of Oracle database using SQL cursor is used to access the ORACLE database language, PL / SQL to expand and strengthen the functions of the SQL, it also introduced a stronger logic. PL / SQL support of DML commands and SQL statements to ...

367: SQLServer connection of the three most common errors
SQL Server to connect the three most common errors One. "SQL Server does not exist or access denied" 2, server-side network configuration error 3, the client network configuration error ============= First of all, check the network phy...

368: Librarycachelock completely understand the causes and solutions (c)
Library cache lock completely understand the causes and solutions (c) There is also a situation, when we use create or replace procedure / function, such as amendments to Procedure and Function statements, the session will hang to live, which is Wh...

369: Writing the history of the Oracle - ORACLE Corporation legend
Writing the history of the Oracle - ORACLE Corporation legend ORACLE Corporation Origin IBM researcher Scott Edgar (Edgar Frank Codd) in Communications of ACM on the article published a well-known "large-scale shared database relational model...

370: Oracle Database Security Strategy (2)
Oracle Database Security Strategy (2) SQL * DBA command security: (2) shutdown (3) connect internal Security database files: Network Security: B through orapwd to the DBA to set a special password. Second, the establishment of the security st...

371: Oracle database security policy analysis (3)
Oracle database security policy analysis (3) Data security strategy: If the user is the user through the database to confirm identity, then recommend the use of encrypted password to connect with the database. ora_encrypt_login for true; dbling_...

372: Oracle database security policy analysis (1)
Oracle database security policy analysis (1) rms and so on, should be the implementation of this group, and then the authority of the utility routines for the 710, it will allow the user to perform with the group, while other users can not. In SQL...

373: Database Security Strategy (2)
Database Security Strategy (2) Topics: database security strategy In the Oracle Web Server using the SSL protocol installed 1998/6/18 In the Oracle Web Server security authentication request to produce% genreq / * running under the ORACLE_HOME p...

374: Database Security Strategy (1)
Database Security Strategy (1) Database Security Strategy Database security issue has been around the nightmare of a database administrator, database data loss and database users have been illegally invaded, exhausted physically and mentally make ...

375: Real-time communications using the Oracle
Real-time communications using the Oracle Oracle's UTL_SMTP package Oracle8i introduced in UTL_SMTP package (SMTP on behalf of Simple Mail Transfer Protocol Simple Mail Transfer Protocol, the use of TCP port 25 in between the client and server...

376: Oracle database, how to eliminate potential safety problems (3)
Oracle database, how to eliminate potential safety problems (3) 1. Damage to data files Third, the establishment of Oracle's audit mechanisms ...

377: Oracle Database how to eliminate the security risks (2)
Oracle Database how to eliminate the security risks (2) (A) ORACLE database backup ...

378: Oracle 9i modify the structure of data tables
(1) as shown in Figure 7.19. (2) appears as shown in Figure 7.20 Edit table】 【General Information tab. (3) the operation of the other tab is relatively simple, will not repeat them here. ...

379: Oracle 9i to create data tables
To create two data tables 1. Graduate Information Form Table Name: scott.student. Table structure as shown in Table 7.6. 3. The relationship between two data tables Instructor Information Sheet (scott.director) the main code "DIRECTOR_ID&q...

380: Oracle 9i data table types
Table 7.5 Oracle 9i data table types Way Features Relations The default table type, permanent storage of data, can be geographical, it can improve the performance table and easy to manage Temporary table Store private data or a specific data s...


Page 19 of 37
[1]   [2]   [3]   [4]   [5]   [6]   [7]   [8]   [9]   [10]   [11]   [12]   [13]   [14]   [15]   [16]   [17]   [18]   [19]   [20]   [21]   [22]   [23]   [24]   [25]   [26]   [27]   [28]   [29]   [30]   [31]   [32]   [33]   [34]   [35]   [36]   [37]