Hands-on oracle application express security : building secure apex applications /
BAn example-driven approach to securing Oracle APEX applications/b As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applicati...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Wiley,
2013.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Hands-On Oracle Application Express Security: Building Secure Apex Applications
- Copyright
- About the Authors
- About the Technical Editor
- Acknowledgments
- Contents
- Introduction
- Structure
- Some Basics
- APEX URL Format
- JavaScript Console
- Other Resources
- Chapter 1: Access Control
- The Problem
- The Solution
- Authentication
- Application Authentication
- Page Authentication
- Authorization
- Application Authorization
- Page Authorization
- Button and Process Authorization
- Process Authorization
- On-Demand
- File UploadSummary
- Chapter 2: Cross-Site Scripting
- The Problem
- The Solution
- Examples
- Understanding Context
- Reports
- Report Column Display type
- Report Column Formatting
- HTML Expressions
- Report Column Formatting
- Column Link
- Report Column
- List of Values
- Direct Output
- Summary
- Chapter 3: SQL Injection
- The Problem
- The Solution
- Validation
- Examples
- Dynamic SQL
- Execute Immediate
- Example
- Dynamic SQL
- Cursors
- Example
- Dynamic SQL
- APEX API
- Example
- Function Returning SQL QueryExample
- Substitution Variables
- Example
- Summary
- Chapter 4: Item Protection
- The Problem
- The Solution
- Validations
- Value Protected
- Page Access Protection
- Session State Protection
- Prepare_Url Considerations
- Ajax Considerations
- Examples
- Authorization Bypass
- Form and Report
- Summary
- Appendix A: Using Apexsec to Locate Security Risks
- Apexsec Online Portal
- Apexsec Desktop
- Appendix B: Updating Item Protection
- Appendix C: Untrusted Data Processing
- Expected ValueSafe Quote
- Colon List to Comma List
- Tag Stripping