000 03101nam a22004095i 4500
001 978-1-4302-3832-4
003 DE-He213
005 20140220083718.0
007 cr nn 008mamaa
008 111213s2011 xxu| s |||| 0|eng d
020 _a9781430238324
_9978-1-4302-3832-4
024 7 _a10.1007/978-1-4302-3832-4
_2doi
050 4 _aQA76.6-76.66
072 7 _aUM
_2bicssc
072 7 _aCOM051000
_2bisacsh
082 0 4 _a005.11
_223
100 1 _aCoffin, David.
_eauthor.
245 1 0 _aExpert Oracle and Java Security
_h[electronic resource] :
_bProgramming Secure Oracle Database Applications with Java /
_cby David Coffin.
264 1 _aBerkeley, CA :
_bApress :
_bImprint: Apress,
_c2011.
300 _aXXVI, 472 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
520 _aExpert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords. Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert. Helps you protect against data loss, identity theft, SQL injection, and address spoofing Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more
650 0 _aComputer science.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aProgramming Techniques.
650 2 4 _aData Encryption.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781430238317
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4302-3832-4
912 _aZDB-2-CWD
999 _c105444
_d105444