Expert Oracle Application Express
Security covers all facets of security related to
Oracle Application Express (APEX) development.
From basic settings that can enhance security, to
preventing SQL Injection and Cross Site Scripting
attacks,
Expert Oracle Application Express
Security shows how to secure your APEX
applictions and defend them from intrusion.
Security is a process, not an event.
Expert Oracle Application Express Security is
written with that theme in mind. Scott Spendolini, one
of the original creators of the product, offers not only
examples of security best practices, but also provides
step-by-step instructions on how to implement the
recommendations presented. A must-read for even
the most experienced APEX developer,
Expert Oracle
Application Express Security can help your
organization ensure their APEX applications are as
secure as they can be.
What you’ll learn
- Devise and execute a security plan
- Ensure your installation of APEX is configured
most securely
- Prevent SQL Injection, cross site scripting, and
URL tampering attacks
- Protect your data during all phases of its
lifetime
- Apply security features built into the
database layer
- Design APEX applications to safely be deployed on
the Internet
Who this book is for
Expert Oracle
Application Express Security is aimed at developers
and administrators deploying applications created using
Oracle Application Express (APEX). The topic is
especially important when those applications are
public-facing or involve sensitive data. Any Application
Express developer or administrator who wants to sleep
well at night in an era of network intrusion and data
thievery will want this book.
Table of Contents
Introduction
Part I:
Security Plan
1. Threat Analysis and Assessment
2.
Implementing a Security Plan
Part II: APEX
Settings
3. Architecture
4. Instance
Settings
5. Workspace Settings
6. Application
Settings
7. Mobile Settings
Part III: User
Access
8. User Management
9. User
Authorization
Part IV: Data
Access
10. Secure Export to CSV
11. Secure
Views
12. VPD & OLS
13. Shadow Schema
14.
Encryption
Conclusion