Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Buy

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords.

Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert.

  • Helps you protect against data loss, identity theft, SQL injection, and address spoofing
  • Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor
  • Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more

What you’ll learn

  • Guard against data loss, identity theft, SQL Injection, and to address spoofing
  • Protect sensitive data through encryption, both on disk and on the wire
  • Control access to data using secure roles, single sign-on, proxy connections, and two-factor authentication
  • Protect sensitive source ode through randomization, obfuscation, and wrapping
  • Thwart attempts at SQL injection and other common attacks
  • Manage constraints on the visibility of data and the scope of access

Who this book is for

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java is for every Java developer who uses an Oracle database. It is also for every Oracle database administrator or PL/SQL programmer who supports Java client and web applications. Whatever role you play in developing and supporting Java and Oracle applications, you need to address computer, application, data, and identity security. This book offers the tools you'll need to effectively manage security across all aspects of the applications you support.

Table of Contents

  1. Introduction
  2. Oracle Security
  3. Secure Java Development Concepts
  4. Java Stored Procedures  
  5. Adding Public Key Encryption
  6. Adding Secret Password Encryption
  7. A Working Model for Data Encryption in Transit  
  8. Implementing Single Sign On
  9. Implementing Two-Factor Authentication
  10. Application Identification and Authorization  
  11. Enhancing Our Security
  12. Administration of This Security System
(HTML tags aren't allowed.)

Concepts of Programming Languages (9th Edition)
Concepts of Programming Languages (9th Edition)

Concepts of Programming Languages  is ideal for undergraduate students in Computer Science and Computer Programming courses. It is an ideal reference encapsulating the history and future of programming languages.

 

Now in its Ninth Edition,...

Head First WordPress: A Brain-Friendly Guide to Creating Your Own Custom WordPress Blog
Head First WordPress: A Brain-Friendly Guide to Creating Your Own Custom WordPress Blog

Whether you're promoting your business or writing about your travel adventures, Head First WordPress will teach you not only how to make your blog look unique and attention-grabbing, but also how to take advantage of WordPress platform's more complex features to make your website work well, too.

...

Certified Macromedia® Flash™ MX Designer Study Guide
Certified Macromedia® Flash™ MX Designer Study Guide

You know how to design with Macromedia Flash MX, you just don't know if you know enough to pass the Certified Macromedia Flash MX Designer exam. Rather than start from scratch with a tutorial that covers more than you need to know, get exactly the information you need with the Certified Macromedia Flash...


Geometric Algebra Computing: in Engineering and Computer Science
Geometric Algebra Computing: in Engineering and Computer Science

This book presents contributions from a global selection of experts in the field. This useful text offers new insights and solutions for the development of theorems, algorithms and advanced methods for real-time applications across a range of disciplines. Written in an accessible style, the discussion of all applications is enhanced by the...

Mastering VMware vSphere 5.5
Mastering VMware vSphere 5.5

The 2013 edition of the bestselling vSphere book on the market

Virtualization remains the hottest trend in the IT world, and VMware vSphere is the industry's most widely deployed virtualization solution. The demand for IT professionals skilled in virtualization and cloud-related technologies is great and expected to keep...

Designing for XOOPS: A Quickstart for Designers
Designing for XOOPS: A Quickstart for Designers

Before you dive into this book, I would like to first extend my warm welcome to you as you enter the world of XOOPS. XOOPS is an acronym of eXtensible Object Oriented Portal System. It is an open-source application platform and Content Management System (CMS) written in PHP. It is built for developing a variety of solutions...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy