Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Oracle Application Express Security: Building Secure Apex Applications

Buy
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks.

As web applications rose in popularity around the turn of the century, we worked to develop tools and tactics to assist in attacking sites for customers. As more content was placed within web-based systems, this area of research grew almost in tandem with the number of real-world attacks that were happening against Internet-facing websites.

In recent years, we became exposed to Oracle Application Express (APEX) and realized that there was no single resource for developers on securing their APEX applications. We were able to break into APEX applications in a myriad of ways after learning about the unique structure of the APEX environment. But we had to learn from scratch why the security fl aws existed and how to explain to developers the steps required to resolve the risks. We’ve collated this experience and advice into this book to help any APEX developer create secure APEX applications.

Oracle APEX use is booming, and we’re seeing more Oracle customers choosing APEX for presentation of their business data from the database. Some customers have hundreds of APEX applications, ranging in complexity from simple data presentation and reporting through to complex business process management and geospatial analysis. Many have serious security requirements and need to ensure that their data is protected both from unknown parties operating on their networks, and also their “trusted” users acting with malicious intent.

APEX is a great tool for rapidly getting raw data out of the database and into a familiar browser environment for users. Whereas there is a gain in terms of functionality in this Rapid Application Development (RAD) model, what we often see is a detrimental effect on security. That’s where Recx comes in — we hope this book is useful for all levels of APEX developers to understand the common risks faced by web applications, how they occur within APEX, and the simple steps required to ensure applications are robust against attack.
(HTML tags aren't allowed.)

Window Functions and Their Applications in Signal Processing
Window Functions and Their Applications in Signal Processing

Window functions—otherwise known as weighting functions, tapering functions, or apodization functions—are mathematical functions that are zero-valued outside the chosen interval. They are well established as a vital part of digital signal processing. Window Functions and their Applications in Signal Processing presents an...

Social Media for WordPress: Build Communities, Engage Members and Promote Your Site
Social Media for WordPress: Build Communities, Engage Members and Promote Your Site
The decision to write a book about this content management system was an easy one. At the time of this writing, WordPress powers more than 15 percent of all websites online. That's a considerable bite out of the Internet. Unfortunately, that also meant a lot of books had already been published on WordPress. After a couple of weeks, mulling...
Introduction to Scientific Computing: A Matrix Vector Approach Using MATLAB
Introduction to Scientific Computing: A Matrix Vector Approach Using MATLAB
This book presents a unique approach for one semester numerical methods and numerical analysis courses. Well organized but flexible, the text is brief and clear enough for introductory numerical analysis students to "get their feet wet," yet comprehensive enough in its treatment of problems and applications for higher-level students to...

AngularJS Deployment Essentials
AngularJS Deployment Essentials

Learn how to optimally deploy your AngularJS applications to today's top hosting environments

About This Book

  • Build your own real-time AngularJS application using a modern tool stack and implement a clever deployment strategy
  • Deploy your application into production environments such...
Data Structures and Problem Solving Using C++ (2nd Edition)
Data Structures and Problem Solving Using C++ (2nd Edition)

Data Structures and Problem Solving Using C++ provides a practical introduction to data structures and algorithms from the viewpoint of abstract thinking and problem solving, as well as the use of C++. It is a complete revision of Weissi successful CS2 book Algorithms, Data Structures, and Problem Solving with C++.

The most unique...

In the Godfather Garden: The Long Life and Times of Richie "the Boot" Boiardo (Rivergate Regionals Collection)
In the Godfather Garden: The Long Life and Times of Richie "the Boot" Boiardo (Rivergate Regionals Collection)
In the Godfather Garden is the true story of the life of Richie “the Boot” Boiardo, one of the most powerful and feared men in the New Jersey underworld. The Boot cut his teeth battling the Jewish gang lord Abner Longy Zwillman on the streets of Newark during Prohibition and endured to become one of the East Coast’s...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy