Premium Content

Access "Hands-on Oracle Application Express security"

Hands-on-Oracle-Application-Express-Security-(1383316450_228).jpg

Sponsored by ComputerWeekly.com

Oracle Application Express (APEX) is a technology that allows rapid development of web applications based on data within the Oracle database. Developers using APEX must ensure that their applications are secure in order to protect their data. This Hands-on Oracle APEX Security eBook presents various types of security vulnerability that can arise in APEX applications. The approach is to demonstrate simple examples that we have observed in client applications in a way that developers can re-create and exploit in order to understand the underlying risk. We then show how simple secure coding practice can protect against various security threats. In this sample chapter we show the one particular example of SQL Injection that comes from using Function Returning SQL Query blocks within APEX applications. A developer can follow the example to experiment with a vulnerable APEX application and discuss countermeasures that can be implemented to protect their application and their data. Download includes free access to an online portal from RECX enabling APEX users to test the security of their applications.  Access >>>

Table of contents

  • Access Control
  • Cross-Site Scripting
  • SQL Injection

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Computer Weekly buyer's guide to endpoint security
    BG_0714_endpoint_security.jpg
    E-Handbook

    In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...

  • Social Engineering in IT Security
    Social-Engineering-in-IT Security.jpg
    E-Handbook

    This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...

  • Gartner: Digital transformation: How to survive the information crisis
    Gartner-SurviveInformationCrisis.jpg
    E-Handbook

    It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...