Search: "lock types"
Security model - MaxCompute Documentation
packages with datasheets, grant label permissions to the user. Four types of label permissions are provided ...
Create a RAM role for a trusted IdP - Resource Access Management Documentation
to create a RAM role for a trusted identity provider (IdP). You can create a RAM role for three types of ...
ALTER TABLE... EXCHANGE PARTITION - POLARDB Documentation
target table (both tables must have matching columns and data types). The data contained within the table ...
DBMS_RLS - POLARDB Documentation
specify the types of SQL commands (INSERT, UPDATE, DELETE, or SELECT) to which the policy ...
Step 5: View security reports and log data - DDoS Protection Documentation
: Operation Logs, Protection Logs. The differences between these types of log data are as follows ...
Reference a package - POLARDB Documentation
reference the types, items, and subprograms that are declared within a package specification, use ...
Best practices to defend against mining worms - Cloud Firewall Documentation
product in the industry to defend against these two types of vulnerabilities in the public cloud ...