First Page | Document Content | |
---|---|---|
![]() Date: 2008-09-29 13:20:37Computer network security Cross-platform software Oracle Database Oracle Corporation Pete Finnigan Buffer overflow Computer security SQL injection Copyright law of the United States Software Computing Cyberwarfare | Add to Reading List |
![]() | PeteFinnigan.com security advisory β DIRECTORY OBJECT traversal outside of directory Description Directory objects used in the Oracle databaseDocID: 18LkC - View Document |
![]() | How to unwrap PL/SQL Pete Finnigan, Principal Consultant Insight Consulting IntroductionDocID: 15jK6 - View Document |
![]() | Oracle University Bucharest EXPERT SUMMIT 21stβββ24th April 2015, BucharestDocID: 11adN - View Document |
![]() | Oracle_Security_Basics_UKOUG_2008DocID: 100jQ - View Document |
![]() | Oracle_Security_Masterclass_WH2008DocID: ZRRs - View Document |