Database Reference
In-Depth Information
Figure 17-37. BI-style report
There are a number of good security reports already written, as shown in Figure 17-38 .
Figure 17-38. Security reports that come with EM12c
 
Search WWH ::




Custom Search