Contents
About This Book ........................................................................................................................ xvii
Security overview ............................................................................. 3
Types of users ........................................................................... 4
Catalogs and IQ ............................................................................... 5
The IQ Store .............................................................................. 6
The Catalog Store ..................................................................... 6
Stored procedures............................................................................ 7
Functions ................................................................................. 16
Message logging ............................................................................ 17
iii