|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn768826063 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
111220s2011 caua o 001 0 eng d |
040 |
|
|
|a GW5XE
|b eng
|e pn
|c GW5XE
|d B24X7
|d UMI
|d E7B
|d COO
|d YDXCP
|d EBLCP
|d DEBSZ
|d OCLCO
|d OCLCQ
|d BEDGE
|d OCLCQ
|d IDEBK
|d VT2
|d OCLCF
|d OCLCQ
|d TXI
|d OCLCQ
|d AZK
|d Z5A
|d VGM
|d LIV
|d UAB
|d OCLCQ
|d MERUC
|d ESU
|d IOG
|d N$T
|d OCLCQ
|d CEF
|d INT
|d U3W
|d AU@
|d OCLCQ
|d OCLCO
|d WYU
|d YOU
|d OCLCQ
|d OCLCO
|d OL$
|d OCLCQ
|d OCLCO
|d LEAUB
|d DCT
|d ERF
|d UKAHL
|d WURST
|d OCLCQ
|d LQU
|d BRF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 772190950
|a 780035531
|a 817061635
|a 824110313
|a 961486102
|a 1005786141
|a 1066497059
|a 1086544550
|a 1087227425
|a 1110894758
|a 1112521738
|a 1129341849
|a 1135586607
|a 1152991399
|a 1162735439
|a 1192336208
|a 1204026462
|a 1240518511
|
020 |
|
|
|a 9781430238324
|q (electronic bk.)
|
020 |
|
|
|a 1430238321
|q (electronic bk.)
|
020 |
|
|
|z 9781430238317
|
020 |
|
|
|z 1430238313
|
024 |
7 |
|
|a 10.1007/978-1-4302-3832-4
|2 doi
|
024 |
8 |
|
|a 10.1007/978-1-4302-3
|
029 |
1 |
|
|a AU@
|b 000048718827
|
029 |
1 |
|
|a AU@
|b 000053276214
|
029 |
1 |
|
|a AU@
|b 000058047255
|
029 |
1 |
|
|a AU@
|b 000060583593
|
029 |
1 |
|
|a DEBSZ
|b 367965135
|
029 |
1 |
|
|a DEBSZ
|b 397270712
|
029 |
1 |
|
|a NZ1
|b 14263646
|
029 |
1 |
|
|a AU@
|b 000067100103
|
035 |
|
|
|a (OCoLC)768826063
|z (OCoLC)772190950
|z (OCoLC)780035531
|z (OCoLC)817061635
|z (OCoLC)824110313
|z (OCoLC)961486102
|z (OCoLC)1005786141
|z (OCoLC)1066497059
|z (OCoLC)1086544550
|z (OCoLC)1087227425
|z (OCoLC)1110894758
|z (OCoLC)1112521738
|z (OCoLC)1129341849
|z (OCoLC)1135586607
|z (OCoLC)1152991399
|z (OCoLC)1162735439
|z (OCoLC)1192336208
|z (OCoLC)1204026462
|z (OCoLC)1240518511
|
037 |
|
|
|a CL0500000120
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.D314
|b C64 2011
|
072 |
|
7 |
|a COM
|x 051280
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a UM
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Coffin, David.
|
245 |
1 |
0 |
|a Expert Oracle and Java security :
|b programming secure Oracle database applications with Java /
|c by David Coffin.
|
260 |
|
|
|a [Berkeley, CA] :
|b Apress,
|c ©2011.
|
300 |
|
|
|a 1 online resource (xxvi, 442 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
490 |
1 |
|
|a The expert's voice in Oracle
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed November 29, 2017).
|
520 |
|
|
|a Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords. Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert. Helps you protect against data loss, identity theft, SQL injection, and address spoofing Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more.
|
505 |
0 |
0 |
|g Machine generated contents note:
|g ch. 1
|t Introduction --
|t Requirements --
|t For Windows and UNIX/Linux Users --
|t Background --
|t How to Use This Book --
|t Organization of This Book --
|t Java Objects and Oracle Database Structures --
|t Chapter Review --
|g ch. 2
|t Oracle Database Security --
|t Finding a Test Oracle Database --
|t Working from an Existing Oracle Database --
|t Oracle Users and Schemas --
|t SQL Plus, SQL Developer, JDeveloper, or TOAD --
|t Organization of the Next Few Sections --
|t Working as the SYS User --
|t System Privileges --
|t Roles --
|t Security Administrator User --
|t Security Administrator Role --
|t Audit Trail --
|t Data Dictionary --
|t Working as the Security Administrator --
|t Acquire secadm_role from a SQL Plus Local Connection --
|t Toggle Between Roles --
|t Create an Application Security User --
|t Create an Application User --
|t Create the HR View Role --
|t Audit Changes to Security Administrator Procedures --
|t Audit Failed Attempts to Access HR Data --
|t Working as the HR Schema User --
|t Sensitive Data in the HR Sample Schema --
|t Public View of Employees --
|t Sensitive View of EMPLOYEES --
|t Test Application User Access --
|t Audit Trail Logs for the Sensitive View --
|t Regarding Synonyms --
|t Chapter Review --
|g ch. 3
|t Secure Java Development Concepts --
|t Java Development Kit --
|t Oracle Java Database Connectivity --
|t JAR File Directory Separator --
|t Java Packages --
|t Development at Command Prompt --
|t Environment --
|t Beginning Java Syntax --
|t Byte Code Compilation and the Java Virtual Machine --
|t Java Code and Syntax Concepts --
|t Methods --
|t Values --
|t Members --
|t Objects --
|t Classes and Null --
|t Garbage Collection --
|t Primitives --
|t Strings --
|t Static Modifier and the mainO Method --
|t Public and Private Modifiers --
|t Exceptions --
|t Exception Handling Syntax --
|t Exception Handling Approaches --
|t Java Virtual Machine Sandbox --
|t Chapter Review --
|g ch. 4
|t Java Stored Procedures --
|t Java Stored Procedure Example --
|t Acquiring the Privilege to Load a Java Stored Procedure --
|t Loading Java in the Oracle Database --
|t Handling Exceptions in a Java Stored Procedure --
|t Calling Oracle Database from Java --
|t Method Syntax in Java Stored Procedures --
|t Calling Java from Oracle Database --
|t Installing and Testing the Example Code --
|t Review The Roster of Participants --
|t Cleaning Up --
|t Oracle Java Virtual Machine --
|t Oracle JVM Based on Java SE1.5 --
|t Separate JVM for Each Oracle Session --
|t Oracle JVM Sandbox --
|t Auto-Commit Disabled in the Oracle JVM --
|t Chapter Review --
|g ch. 5
|t Public Key Encryption --
|t Generate Keys on the Client --
|t RSA Public Key Cryptography --
|t Java Code to Generate and Use RSA Keys --
|t Creating a Set of Keys --
|t Hand the Public Key Across the Network --
|t Serialize Objects --
|t Building the Public Key from Artifacts --
|t Generating the RSA Cipher --
|t Using the RSA Cipher --
|t Getting RSA Public Key Artifacts --
|t Using Static Methods and Private Constructor --
|t Instantiating a Connection Member from a Static Initializer --
|t Using One Code for Both Client and Server --
|t Testing on the Client --
|t Writing the mainQ Method --
|t Running the Code --
|t Key Exchange --
|t Creating a Function to Encrypt Data with Public Key --
|t Creating a Procedure to get SYSDATE in Encrypted Form --
|t Loading OracleJavaSecure Java into Oracle Database --
|t Encrypting Data with Public Key --
|t Use Stacked Calls --
|t Decrypting Data with Private Key --
|t Testing on Client and Server --
|t Using IN and OUT Parameters in an OracleCallableStatement --
|t Handle Errors Reported by Oracle Database --
|t Decrypting at the Client --
|t Running Our Code Again --
|t Observing the Results --
|t Removing the Demonstration Oracle Structures --
|t Chapter Review --
|g ch. 6
|t Secret Password Encryption --
|t Approach --
|t Java Code for Secret Password Encryption --
|t Sharing the Artifacts of a Secret Password Key --
|t Initializing Static Class Members --
|t Evaluating the Java 1.5 Password-Based Encryption Bug --
|t Coding an Automatic Upgrade: Negotiated Algorithm --
|t Generating the Password Key --
|t Encrypting with the Public RSA Key --
|t Returning Secret Password Key Artifacts to the Client --
|t Encrypting Data with Our Secret Password --
|t Oracle Structures for Secret Password Encryption --
|t Package to Get Secret Password Artifacts and Encrypted Data --
|t Application Security Package Specification --
|t Application Security Package Body: Functions --
|t Application Security Package Body: Procedures --
|t Java Methods for Secret Password Decryption --
|t Decrypting Data Using the Secret Password Key --
|t Decrypting the DES Passphrase using RSA Private Key --
|t Ancillary Methods for Array Conversion --
|t Method Used to Show Actual Algorithm --
|t Testing DES Encryption on the Client Only --
|t Running the Code --
|t Observing the Results --
|t Coding to Test Client/Server Secret Password Encryption --
|t Setting the Code to Test Server as well as Client --
|t Consider the Server Portion of the mainO Method --
|t Getting the DES Secret Password from Oracle --
|t Seeing the Negotiated Algorithm for Password-Based Encryption --
|t Calling Oracle Database to get Encrypted Data --
|t Testing Oracle Database Encrypt and Local Decrypt Data --
|t Sending Encrypted Data to Oracle --
|t Testing Our Secure Client/Server Data Transmission --
|t Chapter Review --
|g ch. 7
|t Data Encryption in Transit --
|t Security Administrator Activities --
|t Granting More System Privileges to the Application Security User --
|t Permitting Users to Execute Packages in Other Schemas --
|t Application Security User Activities --
|t Creating a Table for Error Logging --
|t Creating a Table for Managing Our Error Log Table --
|t Creating an Error Log Management Procedure --
|t Creating a Trigger to Maintain the Error Log Table --
|t Testing the Trigger --
|t Updating the Application Security Package --
|t Creating an Error Logging Procedure --
|t Executing Package Specification and Body --
|t Methods for Using and Testing Encryption in Transit --
|t Method to Build the Secret Password Key --
|t Temporary Method to Reset All Keys --
|t Loading Updated OracleJavaSecure Class into Oracle --
|t Security Structures for the HR User --
|t Exploring Privileges That Enable HR Tasks --
|t Creating the HR Security Package --
|t Selecting Sensitive Data Columns from EMPLOYEES --
|t Selecting All Data as a Single Sensitive String --
|t Selecting Sensitive Data for an Employee ID --
|t Revising Procedure to Get Shared Passphrase --
|t Updating Sensitive Data Columns in EMPLOYEES --
|t Avoiding SQL Injection --
|t Demonstrating Failure to SQL Inject in Stored Procedure --
|t Executing the HR Package Specification and Body --
|t Inserting an EMPLOYEES Record: Update a Sequence --
|t Demonstrations and Tests of Encrypted Data Exchange --
|t Some Preliminary Steps --
|t Selecting Encrypted Data from EMPLOYEES --
|t Selecting All Columns in Encrypted String --
|t Sending Encrypted Data to Oracle Database for Insert/Update --
|t Selecting a Single Row from EMPLOYEES --
|t Selecting EMPLOYEES Data by Last Name: Try SQL Injection --
|t Selecting EMPLOYEES Data by RAW: Try SQL Injection --
|t Testing Encryption Failure with New Client Keys --
|t Testing Failure with New Oracle Connection --
|t Some Closing Remarks --
|t Executing the Demonstrations and Tests --
|t Observing the Results --
|t Demonstrating Scenarios --
|t Querying Employees to See Updates --
|t Packaging Template to Implement Encryption --
|t Template for Oracle Application Security Structures --
|t Template for Java Calls to Application Security --
|t Java Archive for Use by Applications --
|t Don't Stop Now --
|t Chapter Review --
|g ch.
|
505 |
0 |
0 |
|t 8
|t Single Sign-On --
|t Another Layer of Authentication? --
|t Who Is Logged-ln on the Client? --
|t Find a Better Source of OS User Identity --
|t Use NTSystem or UnixSystem to Get Identity --
|t Do Cross-Platform-Specific Coding with Reflection --
|t Assure More Stringent OS Identity --
|t Access Oracle Database as Our Identified User --
|t Examine the Oracle SSO Options for Programmers --
|t Set a Client Identifier --
|t Prepare to Access HR Data --
|t Update p_check_hrview_access Procedure, Non-Proxy Sessions --
|t Assure Client Identifier and OSJJSER --
|t Audit Activity with Client Identifier Set --
|t Proxy Sessions --
|t Create Individual Person Users in Oracle --
|t Proxy from Users IDENTIFIED EXTERNALLY --
|t Establish a Proxy Session --
|t Update p_check_hrview_access Procedure, Proxy Sessions --
|t Audit Proxy Sessions --
|t Using Connection Pools --
|t Proxy Connections from an OCI Connection Pool --
|t Proxy Sessions from a Thin Client Connection Pool --
|t Universal Connection Pool --
|t Application Use of Oracle SSO --
|t Our Example Application Oracle SSO --
|t Updates to OracleJavaSecure --
|t Code Template to Give Developers --
|t Chapter Review --
|g ch. 9
|t Two-Factor Authentication --
|t Get Oracle Database to Send E-Mail --
|t Installing UTL_MAIL --
|t Granting Access to UTL_MAIL --
|t Testing Sending E-Mail --
|t Getting Oracle Database to Browse Web Pages --
|t Delegating Java Policy to Security Administrator --
|t Permitting Application Security User to Read Web Pages --
|t Two-Factor Authentication Process --
|t Security Considerations for Two-Factor Distribution Avenues --
|t Security Issues with Two-Factor Delivery to E-Mail --
|t Security Issues with Two-Factor Delivery to Pagers --
|t Security Issues with Two-Factor Delivery to Cell Phones --
|t Preferred Two-Factor Delivery --
|t Oracle Structures Supporting Two-Factor Authentication --
|t Creating the SMS Carrier Host Table --
|t Creating a Table of Employee Mobile Numbers --
|t Accessing HR Tables from Application Security Procedures --
|t Create the Two-Factor Codes Cache Table --
|t Testing Cache Aging --
|t Verifying Current Cached Two-Factor Pass Code --
|t Sending Two-Factor Pass Codes --
|t Updating the Secure Application Role, HRVIEW_ROLE Procedure --
|t Update OracleJavaSecurity.java for Two-Factor Authentication.
|
505 |
0 |
0 |
|g Note continued:
|t Setting Some Company-Specific Addresses --
|t Compile Two-Factor Delivery Route Codes: Binary Math --
|t Exploring a Method to Distribute the Two-Factor Codes --
|t Distributing the Code to SMS --
|t Distributing the Code to Pager URL --
|t Distributing the Code to E-Mail --
|t Testing Two-Factor Authentication --
|t Updating OracleJavaSecure Java in Oracle --
|t Editing the Test Code --
|t Planning to Pass the Two-Factor Code as an Argument to Main --
|t Planning to Acquire the Secure Application Role --
|t Running the Tests and Observing the Results --
|t Chapter Review --
|g ch. 10
|t Application Authorization --
|t Secure Application Role Procedure for Multiple Applications --
|t Rebuild Two-Factor Cache Table for Multiple Applications --
|t Update Two-Factor Code Functions to Use Application ID --
|t Move Test for SSO to Separate Function --
|t Add an Oracle Package for Use Only by Application Security --
|t Add Helper Function to Get APP_R0LE --
|t Replace Procedure for hrview_role Access with Dynamic Procedure --
|t Rewrite and Refactor Method to Distribute Two-Factor Code --
|t Procedure to get Employee Addresses for Two-Factor Code Delivery --
|t Stored Procedure to Update Two-Factor Code Cache --
|t Changes to the Method to Distribute Two-Factor Codes --
|t Update to Two-Factor Distribution Formats --
|t Application Authorization Overview --
|t User for Application Authorization --
|t New Profile with Limits and Unlimited --
|t Application Verification User --
|t Application Verification Logon Trigger --
|t Application Verification Logon Procedure --
|t Get Off Function --
|t Function to Find Database User --
|t Proxy Through Application Verification and Other Proxies --
|t Auditing Application Verification --
|t Structures for Application Authorization --
|t More Space for Application Security --
|t Application Connection Registry Table --
|t Set of Connection Strings for an Application --
|t Inner Class to Represent the Application --
|t Implement an Inner Class in OracleJavaSecure --
|t Deserialization and Version UID --
|t Set Application Context --
|t Format the User-Input Two-Factor Code --
|t Save Connection Strings from the Client Perspective --
|t Method to Put Connection Strings in the List for an Application --
|t Client Call to Store List of Connection Strings on Oracle --
|t Save Connection Strings from the Server Perspective --
|t Function to Call Java to Decrypt the List of Connection Strings --
|t Method to Store List of Connection Strings for Application --
|t Oracle Procedures to Get Entries from the Application Registry --
|t Get an Application Connection String: The Java Client Side --
|t Get an Oracle Connection from the List for an Application --
|t Get List of Connection Strings from Oracle Database to Client App --
|t Establish a Connection for Application Verification Processes --
|t Get a List of Application Connection Strings: The Server Side --
|t Test Application Authentication, Phase 1 --
|t Get New Structures into Oracle --
|t Review Steps of Testing --
|t Set the Application Context --
|t Call to Get Application Connections --
|t Send List of Connection Strings to Oracle Database for Storage --
|t Get a Unique Connection for Use in This Application --
|t Use or Lose Initial Application Verification Connection --
|t Get an Application Connection and the Associated Secure Application Role --
|t Get Encrypted Data with the Application Connection --
|t Add More Application Connection Strings --
|t Testing a Second Application --
|t Objects We Have Never Seen --
|t Place Stub Class on Oracle --
|t Get Application Authentication Connection and Role --
|t Test Application Authentication, Phase 2 --
|t Set the Application Context --
|t Store the Connection Strings in Oracle --
|t Get an Application Connection with Role --
|t See the Proxy Connection --
|t Get Encrypted Data from Oracle --
|t Chapter Review --
|g ch. 11
|t Enhancing Security --
|t Hide the APPVER Connection String --
|t Get It from a Second Source/Server --
|t Get It from a Native Call: JNI --
|t Get It from an Encrypted Java Class --
|t Get It from an Encrypted String --
|t Get It from an Encoded String --
|t Create an Oracle Client Wallet --
|t Install the Oracle Client --
|t Create the Wallet --
|t Use the Wallet from SQL Plus --
|t Use the Wallet from Java --
|t Administer Wallet Security --
|t Trace Oracle Client Code --
|t Logging Oracle Thin Client Trace Data --
|t Encrypt Data Stored on Oracle Database --
|t DBMS_CRYPTO Package --
|t Passwords and Keys --
|t Encryption at Rest Key Store --
|t Functions to Encrypt/Decrypt Data at Rest --
|t Wrap Utility --
|t Changes to setOecryptConnsO/getCryptConnsO --
|t Manage Connection Strings for Applications --
|t Create an Application Administrative User --
|t Create an Administrative Role for Application Verification --
|t Delete Connection Strings --
|t Copy Connection Strings from Previous Version of Application --
|t Add Other Authentication Credentials --
|t Update Application Security Structures --
|t Authenticate on a Separate Oracle Instance --
|t Create a New Oracle Database Instance --
|t Create a New Oracle Service --
|t Write the Create Database Command --
|t Create and Configure the Database --
|t Create a Database Link to the ORCL Instance --
|t Revoke PUBLIC Grant on Sensitive Data Dictionary Views --
|t Create the Remaining Structures for Application Authorization --
|t Create Java Structures --
|t Remove Application Verification from the ORCL Instance --
|t Test Enhanced Security --
|t Encode the APPVER User Password for APVER Instance --
|t Edit the Application Passwords to Be Used --
|t Run Main to Test --
|t Run Main to Copy Connection Strings to New Version --
|t Test from a Different Application, TestOracleJavaSecure --
|t Compile and Run as Administrative User, OSADMIN --
|t Run as Non-Administrative User, OSUSER --
|t Chapter Review --
|g ch. 12
|t Administration of Security --
|t Security Administration Interface --
|t Application Login Screen --
|t Application Inner Class --
|t Center Method --
|t Login Screen Constructors --
|t "Wait While Processing" Modal Dialog --
|t Background Processing Thread --
|t Continue Button --
|t Login Screen Closes --
|t Security Administration Menu --
|t Add/Modify User Functional Screen --
|t Instantiate the AddUser Screen --
|t Initialize the Data Selection Components --
|t Select an Existing Employee --
|t Create a New Employee --
|t Save Data for the Employee --
|t User Administration Screen --
|t Create the OJSAAdm User --
|t Enable the OJSAAdm User Across a Database Link --
|t Select an Existing User --
|t Save Updates to the Administrative Privileges --
|t Revoke User Access to Run Applications --
|t Application Assignment Screen --
|t Initializing the Data Selection Components --
|t Selecting an Available Proxy in the Table --
|t Selecting a User from the List --
|t Adding a Proxy to the User's List --
|t Removing a Proxy from the User's List --
|t Saving Updates to the User's Proxies --
|t Application Registration Screen --
|t Application Verification Administrator Role --
|t Create App Class Button --
|t Tables of Specific Application Administrators and Application to Class Registry --
|t Security Table Access Analysis --
|t Register Application Button --
|t Application Selection Screen --
|t Initializing the List of Applications --
|t Selecting the Manage Selected Application Button --
|t Connection String Editor --
|t Initializing the List of Connection Strings --
|t Selecting an Existing Connection String --
|t Updating a Connection String in the List --
|t Saving the List of Connection Strings to the Database --
|t Connection String Copy Screen --
|t Limiting Certain Administrators to Certain Applications --
|t Virtual Private Database --
|t Adding a Dynamic Where Clause to Procedures --
|t Adding a Dynamic Where Clause to a View --
|t Scripts Execution and Code Compilation --
|t Final Updates to OracleJavaSecure --
|t Single Oracle Instance Code --
|t Bootstrap OJSAdmin --
|t Chapter Review.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Oracle (Computer file)
|
630 |
0 |
7 |
|a Oracle (Computer file)
|2 blmlsh
|
630 |
0 |
7 |
|a Oracle (Computer file)
|2 fast
|0 (OCoLC)fst01363816
|
650 |
|
0 |
|a Database security.
|
650 |
|
0 |
|a Java (Computer program language)
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Java (Langage de programmation)
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Programming Languages
|x Java.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Informatique.
|2 eclas
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Database security.
|2 fast
|0 (OCoLC)fst00888063
|
650 |
|
7 |
|a Java (Computer program language)
|2 fast
|0 (OCoLC)fst00982065
|
653 |
0 |
0 |
|a computerwetenschappen
|
653 |
0 |
0 |
|a computer sciences
|
653 |
0 |
0 |
|a programmeren
|
653 |
0 |
0 |
|a programming
|
653 |
0 |
0 |
|a gegevensbeheer
|
653 |
0 |
0 |
|a data management
|
653 |
1 |
0 |
|a Information and Communication Technology (General)
|
653 |
1 |
0 |
|a Informatie- en communicatietechnologie (algemeen)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781430238317
|
830 |
|
0 |
|a Expert's voice in Oracle.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781430238317/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH29395528
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00043721
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL883795
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10520912
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1173488
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 347715
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7342935
|
994 |
|
|
|a 92
|b IZTAP
|