My Account Log in

1 option

Hands-On Oracle Application Express Security : Building Secure Apex Applications

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Recx.
Recx, author.
Language:
English
Subjects (All):
Application software--Development.
Application software.
Oracle Application express.
Physical Description:
1 online resource (118 p.)
Other Title:
Hands-On Oracle Application Express Security
Place of Publication:
Somerset : Wiley, 2013.
Summary:
An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with any website, there is a security risk and threat, and securing APEX applications requires some specific knowledge of the framework. Written by well-known security specialists Recx, this book shows you the correct ways to implement your APEX applications to ensure that they are not vulnerable to attacks. Real-world examples of a variety of security vulnerabilities demonstrate attacks and show the techniques and best practices for making applications secure. Divides coverage into four sections, three of which cover the main classes of threat faced by web applications and the forth covers an APEX-specific protection mechanism Addresses the security issues that can arise, demonstrating secure application design Examines the most common class of vulnerability that allows attackers to invoke actions on behalf of other users and access sensitive data The lead-by-example approach featured in this critical book teaches you basic "hacker" skills in order to show you how to validate and secure your APEX applications.
Contents:
""Contents""; ""Introduction""; ""Chapter 1: Access Control""; ""The Problem""; ""The Solution""; ""Authentication""; ""Authorization""; ""Summary""; ""Chapter 2: Cross-Site Scripting""; ""The Problem""; ""The Solution""; ""Examples""; ""Understanding Context""; ""Reports""; ""Direct Output""; ""Summary""; ""Chapter 3: SQL Injection""; ""The Problem""; ""The Solution""; ""Examples""; ""Dynamic SQL - Execute Immediate""; ""Dynamic SQL - Cursors""; ""Dynamic SQL - APEX API""; ""Function Returning SQL Query""; ""Substitution Variables""; ""Summary""; ""Chapter 4: Item Protection""
""The Problem""""The Solution""; ""Validations""; ""Value Protected""; ""Page Access Protection""; ""Session State Protection""; ""Examples""; ""Summary""; ""Appendix A: Using Apexsec to Locate Security Risks""; ""Appendix B: Updating Item Protection""; ""Appendix C: Untrusted Data Processing""
Notes:
Description based upon print version of record.
ISBN:
9781118686133
1118686136
OCLC:
849927037
Publisher Number:
EB00064106 Recorded Books

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account