Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Oracle Application Express Security: Building Secure Apex Applications

Buy
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks.

As web applications rose in popularity around the turn of the century, we worked to develop tools and tactics to assist in attacking sites for customers. As more content was placed within web-based systems, this area of research grew almost in tandem with the number of real-world attacks that were happening against Internet-facing websites.

In recent years, we became exposed to Oracle Application Express (APEX) and realized that there was no single resource for developers on securing their APEX applications. We were able to break into APEX applications in a myriad of ways after learning about the unique structure of the APEX environment. But we had to learn from scratch why the security fl aws existed and how to explain to developers the steps required to resolve the risks. We’ve collated this experience and advice into this book to help any APEX developer create secure APEX applications.

Oracle APEX use is booming, and we’re seeing more Oracle customers choosing APEX for presentation of their business data from the database. Some customers have hundreds of APEX applications, ranging in complexity from simple data presentation and reporting through to complex business process management and geospatial analysis. Many have serious security requirements and need to ensure that their data is protected both from unknown parties operating on their networks, and also their “trusted” users acting with malicious intent.

APEX is a great tool for rapidly getting raw data out of the database and into a familiar browser environment for users. Whereas there is a gain in terms of functionality in this Rapid Application Development (RAD) model, what we often see is a detrimental effect on security. That’s where Recx comes in — we hope this book is useful for all levels of APEX developers to understand the common risks faced by web applications, how they occur within APEX, and the simple steps required to ensure applications are robust against attack.
(HTML tags aren't allowed.)

Hybrid Electric Vehicle System Modeling and Control (Automotive Series)
Hybrid Electric Vehicle System Modeling and Control (Automotive Series)

This new edition includes approximately 30% new materials covering the following information that has been added to this important work:

- extends the contents on Li-ion batteries detailing the positive and negative electrodes and characteristics and other components including binder, electrolyte, separator and foils, and the...

Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)
Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)

This book presents a rich compilation of real-world cases on digitalization, the goal being to share first-hand insights from respected organizations and to make digitalization more tangible. As virtually every economic and societal sector is now being challenged by emerging technologies, the digital economy is a highly...

Programming Graphical User Interfaces in R (Chapman & Hall/CRC The R Series)
Programming Graphical User Interfaces in R (Chapman & Hall/CRC The R Series)

Programming Graphical User Interfaces with R introduces each of the major R packages for GUI programming: RGtk2, qtbase, Tcl/Tk, and gWidgets. With examples woven through the text as well as stand-alone demonstrations of simple yet reasonably complete applications, the book features topics especially relevant to statisticians...


Device and Materials Modeling in PEM Fuel Cells (Topics in Applied Physics)
Device and Materials Modeling in PEM Fuel Cells (Topics in Applied Physics)

The impact of proton exchange membrane (PEM) fuel cells on energy generation will parallel the impact of the integrated circuit on information technology. The underlying processes in PEM fuel cells have strong ties to energy generation at the mitochondrial level in organic life. The potential applications range from the micron scale to large...

Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing
Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing

Wiley-Interscience Series in Discrete Mathematics and Optimization Advisory Editors Ronald L. Graham Jan Karel Lenstra Robert E. Tarjan Discrete Mathematics and Optimization involves the study of finite structures. It is one of the fastest growing areas in mathematics today. The level and depth of recent advances in the area and the wide...

Photography for the Web
Photography for the Web

A hands-on on guide to digital photography, with a practical focus on the Web. Readers will learn how to make the most of their digital camera, while learning the basics of composition, exposures, filters and more.

Step-by-step guides will walk readers through advance techniques like using long exposures,
...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy