Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Buy

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords.

Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert.

  • Helps you protect against data loss, identity theft, SQL injection, and address spoofing
  • Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor
  • Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more

What you’ll learn

  • Guard against data loss, identity theft, SQL Injection, and to address spoofing
  • Protect sensitive data through encryption, both on disk and on the wire
  • Control access to data using secure roles, single sign-on, proxy connections, and two-factor authentication
  • Protect sensitive source ode through randomization, obfuscation, and wrapping
  • Thwart attempts at SQL injection and other common attacks
  • Manage constraints on the visibility of data and the scope of access

Who this book is for

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java is for every Java developer who uses an Oracle database. It is also for every Oracle database administrator or PL/SQL programmer who supports Java client and web applications. Whatever role you play in developing and supporting Java and Oracle applications, you need to address computer, application, data, and identity security. This book offers the tools you'll need to effectively manage security across all aspects of the applications you support.

Table of Contents

  1. Introduction
  2. Oracle Security
  3. Secure Java Development Concepts
  4. Java Stored Procedures  
  5. Adding Public Key Encryption
  6. Adding Secret Password Encryption
  7. A Working Model for Data Encryption in Transit  
  8. Implementing Single Sign On
  9. Implementing Two-Factor Authentication
  10. Application Identification and Authorization  
  11. Enhancing Our Security
  12. Administration of This Security System
(HTML tags aren't allowed.)

Smart Information and Knowledge Management: Advances, Challenges, and Critical Issues (Studies in Computational Intelligence)
Smart Information and Knowledge Management: Advances, Challenges, and Critical Issues (Studies in Computational Intelligence)

New approaches are needed that could move us towards developing effective applicable intelligent systems for problem solving and decision making, One of the main efforts in intelligent systems development is focused on knowledge and information management which is regarded as the crucial issue in smart decision making support. The 14 Chapters of...

Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance
Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance

This book is about expanding Internet business risk management strategies into resilience such as software diversity; into financial risk transfer instruments such as insurance policies, catastrophe bonds, performance bonds, and self-insurance as in Basel II; and into reputation systems.

Traditional Internet performance and...

Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an...


Windows Phone 7 Development Internals: Covers Windows Phone 7 and Windows Phone 7.5
Windows Phone 7 Development Internals: Covers Windows Phone 7 and Windows Phone 7.5
The smart phone is increasingly important in people’s daily lives. It is used for a wide variety of tasks, both work-related and non-work related. People use smart phones to keep up to date with friends and family, for relaxation, and for entertainment, as well as for viewing documents and spreadsheets,...
Silverlight Recipes: A Problem-Solution Approach (Books for Professionals by Professionals)
Silverlight Recipes: A Problem-Solution Approach (Books for Professionals by Professionals)

Being asked to write a foreword for a book is like being asked to be the best man or maid of honor in a wedding. You participate with the intention to support and to represent the curators of a new entity (in this case, a book) with pride and integrity. You also have to be genuine or the “crowd” will see right through you.

...
The Visual Basic .NET Programming Language (Microsoft Net Development Series)
The Visual Basic .NET Programming Language (Microsoft Net Development Series)
If you want to leverage all of VB .NET’s immense power, get this book. It’s the definitive VB .NET reference and tutorial, and the first Visual Basic book written by one of VB .NET’s lead architects. No other book offers this much behind-the-scenes insight about why VB .NET works the way it does, how it evolved, and how you can...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy