Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Every day I read e-mails and articles dealing with computer security attacks and breaches, and the repercussions that follow. I have been getting onboard with computer security for decades, and there is no end in sight for this effort. Each and every professional in information technology has a commitment to keep with regard to computer security. We have, most of us, signed computing codes of conduct, and further we have aligned ourselves with those who protect the computing resources of our respective companies | THE EXPERT S VOICE IN ORACLE Expert Oracle and Java Security Programming Secure Oracle Database Applications With Java PRACTICE A HOLISTIC VIEW TO SECURITY THAT PROTECTS PRECIOUS DATA ON THE CLIENT ON THE SERVER AND WHILE MOVING IN BETWEEN David Coffin - Apress For your convenience Apress has placed some of the front matter material after the index. Please use the Bookmarks and Contents at a Glance links to access them. Contents at a Glance About the Author.xxii About the Technical Reviewer.xxiii Acknowledgments.xxiv Introduction.xxv Chapter 1 Introduction.1 Chapter 2 Oracle Database Security.5 Chapter 3 Secure Java Development Concepts.27 Chapter 4 Java Stored Procedures.51 Chapter 5 Public Key Encryption.63 Chapter 6 Secret Password Encryption.85 Chapter 7 Data Encryption in Transit.111 Chapter 9 Two-Factor Authentication.177 Chapter 10 Application Authorization.209 Chapter 11 Enhancing Security.267 Chapter 12 Administration of Security.329 Appendix A List of Methods from OracleJavaSecure Class.403 Appendix B Oracle Procedures Functions and Triggers for Oracle and Java Security.407 Index.413 .