Contents
Application Security Assessment
Chapter 2: Implementing a Security Plan
The f Procedure and WWV_FLOW.SHOW
Oracle HTTP Server and mod_plsql
The Instance Administration API
The Instance Administrator Database Role
Instance Configuration Settings
Manage Workspace to Schema Assignments
Workspace Management Best Practices
Chapter 6: Application Settings
Hesitancy Toward Corporate Adoption
Mobile Considerations for Security
Chapter 7: Application Threats
Bind Variable Notation and Dynamic SQL in APEX
Virtual Private Database and Secure Views
Chapter 8: User Authentication
Types of Authentication Schemes
Oracle Application Server Single Sign-On
APIs for Custom Authentication
Common Authentication Scheme Components
Implementing Authorization Schemes
Gatekeeper Authorization Scheme
Page-Level Authorization Schemes
Chapter 10: Secure Export to CSV
Column Restrictions: Standard Reports
Column Restrictions: Interactive Reports
Restricting Records with ROWNUM
Restricting Records with PL/SQL
Chapter 12: Virtual Private Database
Column Masking and Obfuscation
Managing VPD in Oracle Enterprise Manager
Database: Schema and Object Creation
Instance Admin Console and Application Development Environment
3.141.4.179