paperback. Zustand: Very Good.
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This is Part 4 of a series of quick learning guides for Oracle administrators, designers, developers and managers. Part 4 introduces early entrants with basic Oracle skills to the main concepts of Oracle data security and user privilege management and administration.The guide includes details of how to create and how to manage users and their database object and system access and rights. The guide also provides a basis for understanding different database security strategies such as role-based security, virtual private databases and procedure-based security.Part 4 contains a glossary of Oracle terminology related to database security and user privilege administration with clear explanations of the terms used.These guides are designed to rapidly deliver key information about Oracle to the following audience groups: - Project Managers, Database Administrators, Team Leaders, and Testers who are new to Oracle and need rapid access to strategic information about the Oracle security environment in both development and production databases.- Business Analysts, Software Designers and Developers who are new to Oracle and need to gain a detailed understanding of the data security and administration issues involved in an Oracle database.Part 4 of these guides assumes that the reader has read Parts 1, 2 and 3 of the Oracle Quick Guides or their equivalent content. The contents of Part 4 include the following subject headings:1. Oracle Database Security Architecture2. Managing Oracle User Security3. Managing Privileges and Roles4. Managing Resources with Profiles5. Managing Passwords with Profiles6. Special Users and Privileges - SYS, SYSTEM, SYSDBA, SYSOPER7. Managing Developer Security8. Virtual Private Databases (VPD)9. Procedure Execution Security10. Data Security using Views11. Tool Security - PRODUCT_USER_PROFILE Table12. Obtaining Security Information from the Data Dictionary13. Glossary of TermsAppendix 1 - Common System PrivilegesAppendix 2 - SYSDBA and SYSOPER PrivilegesAppendix 3 - SQL commands which can be disabled.
Taschenbuch. Zustand: Neu. Neuware - Have you ever bought something you didn't really want, agreed to do something you didn't really didn't want to do, or lost an argument because you let your words be twisted and used against you Have you ever felt that those faces on TV, those in authority in politics and industry, might be not quite telling you the whole truth, that they could be holding something back It might be the government, your boss, a politician, a colleague at work, a family member or a slick advertising campaign. Manipulation as a means of controlling or influencing human behaviour is now a constant at all levels of modern life - it is everywhere.We all know that sometimes we are being manipulated by someone. Mostly we do nothing about it because we can't or we just don't know how. Occasionally, when we get so frustrated that we just have to act, we often end up in a costly mess, regretting that we ever challenged the manipulator in the first place. Most of us are as innocent as lambs to the slaughter when it comes to the professional manipulator.But there are ways to understand and manage a manipulator, whether it's an individual, a group, or a government. Firstly, we need to be able to recognise and understand a manipulative act, how it works, the motives for it and why we, in particular, are its victims. To this end, the author seeks to illuminate 'Human Manipulation' at all levels. This handbook provides the reader with a detailed definition of human manipulation, an understanding of the history and morality of manipulation, and the psychology of the manipulative and manipulated personalities. Then, one by one, the book identifies and examines each of the 450 manipulative techniques that are described in detail, how they are executed and what a victim can do to recognise, avoid and counteract them. Manipulation is generally covert and it relies on human ignorance. We rarely recognise a manipulative action immediately and if we ever finally discover it, it may be just too late to take action to avoid it. However, the better informed we are on the subject, the better our chances of seeing and managing manipulation when it is directed at us. This handbook is probably the most comprehensive analysis of human manipulation anywhere and a 'must have' for any serious student of the subject.In government and business, political manipulation is constantly used for institutional social control. It is now the preferred method, in fact. This is simply because our leaders can no longer use the more traditional acts of violence and intimidation against us. Thus, a new, efficient modus of control has evolved to herd and manage the human population. It is ubiquitous. In fact, we are so inured to manipulation, that we even do it ourselves: at home and at work with our colleagues, friends and family.More frighteningly, as the lines between government and commerce become blurred, government and big capital merge, from a popular point of view, into the great 'Them'. 'They' are now in a unique historical position. 'They' have access to unlimited economic resources, 'they' control the media, and 'they' control all political and military resources and institutions.A concentration of power between political and economic elites creates an enormous risk to human freedom. These elites have moved on from the messy and violent traditional methods of social control, to a much more dangerous paradigm of social manipulation; but this time backed up by the end-stop of limitless state and political violence.Such a dangerous conjunction of total influence and power has rarely existed in human history. This is a time for universal political reflection and the primary reason for this book. Forewarned is forearmed.