Expert Oracle Application Express Security
by Scott Spendolini
Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings that can enhance security, to preventing SQL Injection and Cross Site Scripting attacks, Expert Oracle Application Express Security shows how to secure your APEX applictions and defend them from/em>/em>
… See more details belowOverview
Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings that can enhance security, to preventing SQL Injection and Cross Site Scripting attacks, Expert Oracle Application Express Security shows how to secure your APEX applictions and defend them from intrusion.
Security is a process, not an event. Expert Oracle Application Express Security is written with that theme in mind. Scott Spendolini, one of the original creators of the product, offers not only examples of security best practices, but also provides step-by-step instructions on how to implement the recommendations presented. A must-read for even the most experienced APEX developer, Expert Oracle Application Express Security can help your organization ensure their APEX applications are as secure as they can be.
What you’ll learn
- Devise and execute a security plan
- Ensure your installation of APEX is configured most securely
- Prevent SQL Injection, cross site scripting, and URL tampering attacks
- Protect your data during all phases of its lifetime
- Applysecurity features built into the database layer
- Design APEX applications to safely be deployed on the Internet
Who this book is for
Expert Oracle Application Express Security is aimed at developers and administrators deploying applications created using Oracle Application Express (APEX). The topic is especially important when those applications are public-facing or involve sensitive data. Any Application Express developer or administrator who wants to sleep well at night in an era of network intrusion and data thievery will want this book.
Table of Contents
IntroductionPart I: Security Plan
1. Threat Analysis and Assessment
2. Implementing a Security Plan
Part II: APEX Settings
3. Architecture
4. Instance Settings
5. Workspace Settings
6. Application Settings
7. Mobile Settings
Part III: User Access
8. User Management
9. User Authorization
Part IV: Data Access
10.Secure Export to CSV
11. Secure Views
12. VPD & OLS
13. Shadow Schema
14. Encryption
Conclusion
Product Details
- ISBN-13:
- 9781430247319
- Publisher:
- Apress
- Publication date:
- 04/30/2013
- Edition description:
- 2013
- Pages:
- 296
- Sales rank:
- 635,962
- Product dimensions:
- 9.10(w) x 7.50(h) x 0.70(d)
Customer Reviews
Average Review: