Expert Oracle and Java Security Programming Secure Oracle Database Applications With Java

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider pot...

Full description

Bibliographic Details
Main Author: Coffin, David
Format: eBook
Language:English
Published: Berkeley, CA Apress 2011, 2011
Edition:1st ed. 2011
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02761nmm a2200313 u 4500
001 EB000361194
003 EBX01000000000000000214246
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9781430238324 
100 1 |a Coffin, David 
245 0 0 |a Expert Oracle and Java Security  |h Elektronische Ressource  |b Programming Secure Oracle Database Applications With Java  |c by David Coffin 
250 |a 1st ed. 2011 
260 |a Berkeley, CA  |b Apress  |c 2011, 2011 
300 |a XXVI, 472 p. 22 illus  |b online resource 
653 |a Programming Techniques 
653 |a Computer programming 
653 |a Cryptography 
653 |a Data encryption (Computer science) 
653 |a Java 
653 |a Cryptology 
653 |a Java (Computer program language) 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/978-1-4302-3832-4 
856 4 0 |u https://doi.org/10.1007/978-1-4302-3832-4?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.133 
520 |a Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords. Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert. Helps you protect against data loss, identity theft, SQL injection, and address spoofing Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more