Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert Oracle Application Express Security (Expert's Voice in Oracle)

Buy

Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development.  From basic settings that can enhance security, to preventing SQL Injection and Cross Site Scripting attacks, Expert Oracle Application Express Security shows how to secure your APEX applictions and defend them from intrusion.  

Security is a process, not an event.  Expert Oracle Application Express Security is written with that theme in mind. Scott Spendolini, one of the original creators of the product, offers not only examples of security best practices, but also provides step-by-step instructions on how to implement the recommendations presented.  A must-read for even the most experienced APEX developer, Expert Oracle Application Express Security can help your organization ensure their APEX applications are as secure as they can be.

What you’ll learn

  • Devise and execute a security plan
  • Ensure your installation of APEX is configured most securely
  • Prevent SQL Injection, cross site scripting, and URL tampering attacks
  • Protect your data during all phases of its lifetime
  • Apply security features built into the database layer
  • Design APEX applications to safely be deployed on the Internet

Who this book is for

Expert Oracle Application Express Security is aimed at developers and administrators deploying applications created using Oracle Application Express (APEX). The topic is especially important when those applications are public-facing or involve sensitive data. Any Application Express developer or administrator who wants to sleep well at night in an era of network intrusion and data thievery will want this book.

Table of Contents

Introduction

Part I: Security Plan

1. Threat Analysis and Assessment

2. Implementing a Security Plan

Part II: APEX Settings

3. Architecture

4. Instance Settings

5. Workspace Settings

6. Application Settings

7. Mobile Settings

Part III: User Access

8. User Management

9. User Authorization

Part IV: Data Access

10. Secure Export to CSV

11. Secure Views

12. VPD & OLS

13. Shadow Schema

14. Encryption

Conclusion

(HTML tags aren't allowed.)

Intimacy: Clinical, Cultural, Digital and Developmental Perspectives
Intimacy: Clinical, Cultural, Digital and Developmental Perspectives

Intimacy: Clinical, Cultural, Digital and Developmental Perspectives applies a contemporary, psychoanalytic lens to the many facets of intimacy between people, from romantic and sexual relationships, to friendliness, as well as the ways intimacy is mediated by new digital technologies.

Identifying...

Socio-Emotional Relationship Therapy: Bridging Emotion, Societal Context, and Couple Interaction (AFTA SpringerBriefs in Family Therapy)
Socio-Emotional Relationship Therapy: Bridging Emotion, Societal Context, and Couple Interaction (AFTA SpringerBriefs in Family Therapy)

This path-breaking volume introduces Socio-Emotional Relationship Therapy for clinical work with troubled couples. Practice-focused and engaging, it integrates real-world knowledge of the intersections of gender, culture, power, and identity in relationships with empirical findings on the neurobiology of attraction. Case examples detail the...

Professional ASP.NET 2.0 XML (Programmer to Programmer)
Professional ASP.NET 2.0 XML (Programmer to Programmer)

You'll also learn more about SQL Server 2005 XML features, XML serialization, and XML Web services. You'll see how XML can be used to increase application efficiency and reach. Two helpful real-life case studies used throughout the book demonstrate the many ways that XML documents can be created, transformed, and transmitted to other systems...


JavaTM Programming with CORBATM : Advanced Techniques for Building Distributed Applications
JavaTM Programming with CORBATM : Advanced Techniques for Building Distributed Applications
The leading guide for Java developers who build business applications with CORBA Acknowledged experts present advanced techniques and real-world examples for building both simple and complex programs using Java with CORBA. The authors begin with a quick overview of CORBA, Java, object request brokers (ORBs), and EJB components, then quickly move on...
An Introduction to Linear Programming and Game Theory
An Introduction to Linear Programming and Game Theory

Praise for the Second Edition:

"This is quite a well-done book: very tightly organized, better-than-average exposition, and numerous examples, illustrations, and applications."
—Mathematical Reviews of the American Mathematical Society

An Introduction to Linear Programming and...

Building Web Reputation Systems
Building Web Reputation Systems

Today’s Web is the product of over a billion hands and minds. Around the clock and around the globe, people are pumping out contributions small and large: full-length features on Vimeo, video shorts on YouTube, comments on Blogger, discussions on Yahoo! Groups, and tagged-and-titled Del.icio.us bookmarks. User-generated content...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy