Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Buy

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords.

Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert.

  • Helps you protect against data loss, identity theft, SQL injection, and address spoofing
  • Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor
  • Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more

What you’ll learn

  • Guard against data loss, identity theft, SQL Injection, and to address spoofing
  • Protect sensitive data through encryption, both on disk and on the wire
  • Control access to data using secure roles, single sign-on, proxy connections, and two-factor authentication
  • Protect sensitive source ode through randomization, obfuscation, and wrapping
  • Thwart attempts at SQL injection and other common attacks
  • Manage constraints on the visibility of data and the scope of access

Who this book is for

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java is for every Java developer who uses an Oracle database. It is also for every Oracle database administrator or PL/SQL programmer who supports Java client and web applications. Whatever role you play in developing and supporting Java and Oracle applications, you need to address computer, application, data, and identity security. This book offers the tools you'll need to effectively manage security across all aspects of the applications you support.

Table of Contents

  1. Introduction
  2. Oracle Security
  3. Secure Java Development Concepts
  4. Java Stored Procedures  
  5. Adding Public Key Encryption
  6. Adding Secret Password Encryption
  7. A Working Model for Data Encryption in Transit  
  8. Implementing Single Sign On
  9. Implementing Two-Factor Authentication
  10. Application Identification and Authorization  
  11. Enhancing Our Security
  12. Administration of This Security System
(HTML tags aren't allowed.)

Charging Ahead: An Itroduction to Electromagnetism (# PB155X)
Charging Ahead: An Itroduction to Electromagnetism (# PB155X)

Energize your next unit on electricity with hands-on activities to explain the fascinating phenomenon of electromagnetism. Students are introduced to the factors that determine the strength of electrical coils, and they use readily available materials to build a simple motor and a generator. Topics covered include circuit breakers, mag-lev...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Solaris 9 for Dummies
Solaris 9 for Dummies
Discover new security features and easier installation

Light up your system with a new resource manager, volume manager, and directory server

In the dark about Solaris 9? Open this book and let the sun shine in! It’ll help you chart a course for StarOffice, explore CDE and GNOME desktops, and harness Solaris power to...


Using Office 365: With Windows 8
Using Office 365: With Windows 8

Learn Office the easy way, no jargon. Clear, concise and to the point... Using Microsoft Office 365, is the essential step by step guide to getting the most out of the traditional  Microsoft Office applications (not SharePoint), providing a complete resource for both the beginner and the enthusiast.

Techniques are
...

Epidemiology of Pediatric Sports Injuries: Individual Sports (Medicine and Sport Science, Vol. 48)
Epidemiology of Pediatric Sports Injuries: Individual Sports (Medicine and Sport Science, Vol. 48)

Epidemiology of Pediatric Sport Injuries reviews integratively the existing data on distribution and determinants of injury rates in a variety of sports, and suggests injury prevention measures and guidelines for further research. This volume focuses on individual sports, as the next volume will discuss team sports. Together the two volumes...

Practical Google Analytics and Google Tag Manager for Developers
Practical Google Analytics and Google Tag Manager for Developers

Whether you’re a marketer with development skills or a full-on web developer/analyst, Practical Google Analytics and Google Tag Manager for Developers shows you how to implement Google Analytics using Google Tag Manager to jumpstart your web analytics measurement.

There’s a reason that so many...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy