|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn849927037 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130527s2013 inua o 000 0 eng d |
010 |
|
|
|z 2013933608
|
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCO
|d OCLCF
|d DKDLA
|d RECBK
|d N$T
|d YDXCP
|d OCLCQ
|d EBLCP
|d OCLCQ
|d AZK
|d LOA
|d COCUF
|d MOR
|d PIFAG
|d MERUC
|d OCLCQ
|d U3W
|d STF
|d WRM
|d NRAMU
|d VT2
|d INT
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d UKAHL
|d UWK
|d OCLCQ
|d VLY
|d OCLCQ
|d SFB
|d ORMDA
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 864917843
|a 889246514
|a 961545822
|a 962682518
|a 975208080
|a 975245207
|a 1017995175
|a 1043659165
|a 1058337789
|a 1081268490
|a 1097090143
|a 1162108799
|a 1166115962
|a 1290088056
|
020 |
|
|
|a 9781118686133
|q (electronic bk.)
|
020 |
|
|
|a 9781118685785
|q (electronic bk.)
|
020 |
|
|
|a 1118685784
|q (electronic bk.)
|
020 |
|
|
|a 1118686136
|q (electronic bk.)
|
020 |
|
|
|z 9781118686096
|
028 |
0 |
1 |
|a EB00064106
|b Recorded Books
|
029 |
1 |
|
|a AU@
|b 000053031986
|
029 |
1 |
|
|a AU@
|b 000062339536
|
029 |
1 |
|
|a AU@
|b 000062436553
|
029 |
1 |
|
|a CHNEW
|b 000618154
|
029 |
1 |
|
|a CHNEW
|b 000901236
|
029 |
1 |
|
|a NZ1
|b 15348094
|
035 |
|
|
|a (OCoLC)849927037
|z (OCoLC)864917843
|z (OCoLC)889246514
|z (OCoLC)961545822
|z (OCoLC)962682518
|z (OCoLC)975208080
|z (OCoLC)975245207
|z (OCoLC)1017995175
|z (OCoLC)1043659165
|z (OCoLC)1058337789
|z (OCoLC)1081268490
|z (OCoLC)1097090143
|z (OCoLC)1162108799
|z (OCoLC)1166115962
|z (OCoLC)1290088056
|
037 |
|
|
|a 9781118686133
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.76.A65
|b R43 2013eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060090
|2 bisacsh
|
082 |
0 |
4 |
|a 005.3
|2 23
|
049 |
|
|
|a UAMI
|
100 |
0 |
|
|a Recx.
|
245 |
1 |
0 |
|a Hands-on oracle application express security :
|b building secure apex applications /
|c Recx.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Wiley,
|c 2013.
|
300 |
|
|
|a 1 online resource (xii, 96 pages) :
|b illustrations (chiefly color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a BAn example-driven approach to securing Oracle APEX applications/b As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with any website, there is a security risk and threat, and securing APEX applications requires some specific knowledge of the framework. Written by well-known security specialists Recx, this book shows you the correct ways to implement your APEX applications to ensure that they are not vulnerable to attacks. Real-world examples of a variety of security vulnerabilities demonstrate attacks and show the techniques and best practices for making applications secure. ulliDivides coverage into four sections, three of which cover the main classes of threat faced by web applications and the forth covers an APEX-specific protection mechanismliAddresses the security issues that can arise, demonstrating secure application designliExamines the most common class of vulnerability that allows attackers to invoke actions on behalf of other users and access sensitive data/ul The lead-by-example approach featured in this critical book teaches you basic "hacker" skills in order to show you how to validate and secure your APEX applications
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Hands-On Oracle Application Express Security: Building Secure Apex Applications -- Copyright -- About the Authors -- About the Technical Editor -- Acknowledgments -- Contents -- Introduction -- Structure -- Some Basics -- APEX URL Format -- JavaScript Console -- Other Resources -- Chapter 1: Access Control -- The Problem -- The Solution -- Authentication -- Application Authentication -- Page Authentication -- Authorization -- Application Authorization -- Page Authorization -- Button and Process Authorization -- Process Authorization -- On-Demand
|
505 |
8 |
|
|a File UploadSummary -- Chapter 2: Cross-Site Scripting -- The Problem -- The Solution -- Examples -- Understanding Context -- Reports -- Report Column Display type -- Report Column Formatting -- HTML Expressions -- Report Column Formatting -- Column Link -- Report Column -- List of Values -- Direct Output -- Summary -- Chapter 3: SQL Injection -- The Problem -- The Solution -- Validation -- Examples -- Dynamic SQL -- Execute Immediate -- Example -- Dynamic SQL -- Cursors -- Example -- Dynamic SQL -- APEX API -- Example
|
505 |
8 |
|
|a Function Returning SQL QueryExample -- Substitution Variables -- Example -- Summary -- Chapter 4: Item Protection -- The Problem -- The Solution -- Validations -- Value Protected -- Page Access Protection -- Session State Protection -- Prepare_Url Considerations -- Ajax Considerations -- Examples -- Authorization Bypass -- Form and Report -- Summary -- Appendix A: Using Apexsec to Locate Security Risks -- Apexsec Online Portal -- Apexsec Desktop -- Appendix B: Updating Item Protection -- Appendix C: Untrusted Data Processing
|
505 |
8 |
|
|a Expected ValueSafe Quote -- Colon List to Comma List -- Tag Stripping
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Oracle Application express.
|
630 |
0 |
7 |
|a Oracle Application express
|2 fast
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Application Development.
|2 bisacsh
|
650 |
|
7 |
|a Application software
|x Development
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Recx.
|t Hands-on oracle application express security.
|d Indianapolis, Ind. : Wiley, 2013
|w (DLC) 2013933608
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118686133/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0021707318
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25209872
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10700063
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 575210
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00064106
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12676862
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10697400
|
994 |
|
|
|a 92
|b IZTAP
|