Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Buy

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords.

Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert.

  • Helps you protect against data loss, identity theft, SQL injection, and address spoofing
  • Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor
  • Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more

What you’ll learn

  • Guard against data loss, identity theft, SQL Injection, and to address spoofing
  • Protect sensitive data through encryption, both on disk and on the wire
  • Control access to data using secure roles, single sign-on, proxy connections, and two-factor authentication
  • Protect sensitive source ode through randomization, obfuscation, and wrapping
  • Thwart attempts at SQL injection and other common attacks
  • Manage constraints on the visibility of data and the scope of access

Who this book is for

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java is for every Java developer who uses an Oracle database. It is also for every Oracle database administrator or PL/SQL programmer who supports Java client and web applications. Whatever role you play in developing and supporting Java and Oracle applications, you need to address computer, application, data, and identity security. This book offers the tools you'll need to effectively manage security across all aspects of the applications you support.

Table of Contents

  1. Introduction
  2. Oracle Security
  3. Secure Java Development Concepts
  4. Java Stored Procedures  
  5. Adding Public Key Encryption
  6. Adding Secret Password Encryption
  7. A Working Model for Data Encryption in Transit  
  8. Implementing Single Sign On
  9. Implementing Two-Factor Authentication
  10. Application Identification and Authorization  
  11. Enhancing Our Security
  12. Administration of This Security System
(HTML tags aren't allowed.)

Python Programming Fundamentals (Undergraduate Topics in Computer Science)
Python Programming Fundamentals (Undergraduate Topics in Computer Science)

This easy-to-follow and classroom-tested textbook guides the reader through the fundamentals of programming with Python, an accessible language which can be learned incrementally. 

Features: incudes numerous examples and practice exercises throughout the text, with additional exercises, solutions and review questions at the...

Theory of User Engineering
Theory of User Engineering

This book outlines the new concept of user engineering and covers the diversity of users, along with the business process that includes the design and the user’s experience processes. Although the concept of user experience (UX) has become popular, the definition and the methodology are still ambiguous. User engineering is similar to...

Bootstrap for Rails
Bootstrap for Rails

A quick-start guide to developing beautiful web applications with the Bootstrap toolkit and Rails framework

About This Book

  • Enhance your applications with Bootstrap modals and carousels
  • Explore the usage of advanced Bootstrap components and plugins in Rails through various examples
  • ...

Quantum Mechanics: A Paradigms Approach
Quantum Mechanics: A Paradigms Approach

This innovative new text presents quantum mechanics in a manner that directly reflects the methods used in modern physics research—making the material more approachable and preparing students more thoroughly for real research. Most texts in this area start with a bit of history and then move directly to...

Intuitionistic Fuzzy Aggregation and Clustering (Studies in Fuzziness and Soft Computing)
Intuitionistic Fuzzy Aggregation and Clustering (Studies in Fuzziness and Soft Computing)

The concept of intuitionistic fuzzy set (IFS) was originally introduced by Atanassov (1983) to extend the concept of the traditional fuzzy set. Each element in an IFS is expressed by an ordered pair which is called an intuitionistic fuzzy value (IFV) (or intuitionistic fuzzy number (IFN)), and each IFV is characterized by a membership degree,...

Database Systems: Design, Implementation and Management, Sixth Edition
Database Systems: Design, Implementation and Management, Sixth Edition
This Sixth Edition takes you clearly and effectively through the entire process of database development and implementation. This market leading text includes new Visio and UML tutorials, as well as a new chapter on Advanced SQL. All appendices are housed on a CD that accompany every copy of the text.

Takes students step by step through
...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy