Expert Oracle Application Express Security
Apress (Verlag)
978-1-4302-4731-9 (ISBN)
Security is a process, not an event. Expert Oracle Application Express Security is written with that theme in mind. Scott Spendolini, one of the original creators of the product, offers not only examples of security best practices, but also provides step-by-step instructions on how to implement the recommendations presented. A must-read for even the most experienced APEX developer, Expert Oracle Application Express Security can help your organization ensure their APEX applications are as secure as they can be.
Scott Spendolini is president & co-founder of Sumneva , a world-class Oracle Application Express (APEX) consulting, training, and solutions firm founded in 2010. He has assisted a number of clients from various verticals with their Oracle APEX development and training needs. Spendolini has presented at a number of Oracle-related conferences, including Oracle OpenWorld, ODTUG, and IOUG, and is a regular contributor to the Oracle APEX Forums on OTN. Spendolini is also the host & conference chair of APEXposed, an APEX-specific annual conference. He is a recent recipient of the Oracle Ace Director designation and is also a co-author of the book Pro Oracle Application Express. In 2009, Spendolini, along with ODTUG, was presented with the Oracle Innovation Award for his work on ODTUG s public web site, ODTUG.com. Spendolini is also an Oracle Certified Oracle Application Express developer. Prior to co-founding Sumneva, Spendolini founded and ran Sumner Technologies from 2005 through 2009, which also focused on Oracle APEX consulting, training, and solutions. Before that, he was employed by Oracle Corporation for almost 10 years, the last three of which he was a senior product manager for Oracle APEX. He holds a dual bachelor's degree from Syracuse University in management information systems and telecommunications management, and resides in Ashburn, Virginia with his wife and two children.
Introduction Part I: Security Plan 1. Threat Analysis and Assessment 2. Implementing a Security Plan Part II: APEX Settings 3. Architecture 4. Instance Settings 5. Workspace Settings 6. Application Settings 7. Mobile Settings Part III: User Access 8. User Management 9. User Authorization Part IV: Data Access 10. Secure Export to CSV 11. Secure Views 12. VPD & OLS 13. Shadow Schema 14. Encryption Conclusion
Zusatzinfo | 201 Illustrations, black and white; XX, 296 p. 201 illus. |
---|---|
Verlagsort | Berlin |
Sprache | englisch |
Maße | 178 x 254 mm |
Themenwelt | Informatik ► Datenbanken ► Oracle |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-4302-4731-2 / 1430247312 |
ISBN-13 | 978-1-4302-4731-9 / 9781430247319 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich