Implementing security in Developer/2000

From: RECON <info_at_recon.com>
Date: 1998/11/20
Message-ID: <73402s$lij$1_at_fir.prod.itd.earthlink.net>#1/1


If you are faced with the problem of implementing realistic security in a Developer/2000 environment, please visit us at: http://www.recon.com/secur.htm .

You are also invited to receive the RECON Designer/Developer 2000 Newsletter at no charge. http://www.recon.com/oracle/tips.htm .

The newsletter is sent direct to you by email and includes useful tips and techniques that will help you get the most out of the Oracle toolset.

Topics such as:
Forms 5.0 Object Libraries
Coding PL/SQL in the Designer v2.x environment Making effective use of the FHD
The repository as part of industrial-strength configuration management Killer template forms

RECON professionals have developed tens of millions of dollars worth of applications using the Oracle toolset. We have been Masters Program instructors for Oracle on Designer and Developer. RECON experts have lectured for and been published by Codd & Date and have been instrumental in the launch of companies such as Platinum Technology.

To subscribe to the RECON Newsletter, please go to http://www.recon.com/oracle/tips.htm . Received on Fri Nov 20 1998 - 00:00:00 CET

Original text of this message