Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Añadir filtros








Intervalo de año
1.
Chinese Medical Equipment Journal ; (6)2004.
Artículo en Chino | WPRIM | ID: wpr-587104

RESUMEN

The Logminer utility has been provided by the latest Oracle 8i version.It can analyze archived log files and online log files.This paper introduces how to install and use this utility,especially how to make the use of the auditing function on key users and key data tables,as well as recover the hostility operation without the shutdown of database.

2.
Chinese Medical Equipment Journal ; (6)2003.
Artículo en Chino | WPRIM | ID: wpr-592744

RESUMEN

Objective To quickly pinpoint and correct errors in the application level in No.1 Military Medical Project. Methods LogMiner, a powerful tool provided by Oracle was used to mine and analyze the redo log files produced by oracle database in No.1 Military Medical Project. The basic concept, configuration and usage of LogMiner were described through an example of the Register Program in No.1 Military Medical Project. Results The errors made by Register Program was quickly pinpointed and then corrected by SQL statements provided by UNDO_VALUE field. Conclusion The method using LogMiner to pinpoint and correct the errors in the application level in No.1 Military Medical Project is simple, accurate and convenient. It should be a basic technique for maintenance personnel of hospital information system.

3.
Chinese Medical Equipment Journal ; (6)1993.
Artículo en Chino | WPRIM | ID: wpr-591588

RESUMEN

Objective To backup data stored in Oracle database in No.1 Military Medical Project.Methods Oracle encryption features,such as encrypting table columns,encrypting Rman backupset,encrytpting datapump export data were utilized,to encrypt sensitive data stored in HIS of No.1 Military Medical Project.Results The encryption features effectively protected Oracle online data and backup data.Conclusion These methods are secure and feasible in practice.Optimum method can be selected to encrypt data in database according system security requirements.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA