Database Reference
In-Depth Information
Figure 17-37.
BI-style report
There are a number of good security reports already written, as shown in Figure
17-38
.
Figure 17-38.
Security reports that come with EM12c