Expert Oracle Application Express Security

Expert Oracle Application Express Security

by Scott Spendolini

Paperback(1st ed.)

$39.99
Use Standard Shipping. For guaranteed delivery by December 24, use Express or Expedited Shipping.

Product Details

ISBN-13: 9781430247319
Publisher: Apress
Publication date: 04/23/2013
Edition description: 1st ed.
Pages: 296
Product dimensions: 9.10(w) x 7.50(h) x 0.70(d)

About the Author

Scott Spendolini is president & co-founder of Sumneva , a world-class Oracle Application Express (APEX) consulting, training, and solutions firm founded in 2010. He has assisted a number of clients from various verticals with their Oracle APEX development and training needs. Spendolini has presented at a number of Oracle-related conferences, including Oracle OpenWorld, ODTUG, and IOUG, and is a regular contributor to the Oracle APEX Forums on OTN. Spendolini is also the host & conference chair of APEXposed, an APEX-specific annual conference. He is a recent recipient of the Oracle Ace Director designation and is also a co-author of the book Pro Oracle Application Express. In 2009, Spendolini, along with ODTUG, was presented with the Oracle Innovation Award for his work on ODTUG s public web site, ODTUG.com. Spendolini is also an Oracle Certified Oracle Application Express developer. Prior to co-founding Sumneva, Spendolini founded and ran Sumner Technologies from 2005 through 2009, which also focused on Oracle APEX consulting, training, and solutions. Before that, he was employed by Oracle Corporation for almost 10 years, the last three of which he was a senior product manager for Oracle APEX. He holds a dual bachelor's degree from Syracuse University in management information systems and telecommunications management, and resides in Ashburn, Virginia with his wife and two children.

Table of Contents

Introduction

Part I: Security Plan

1. Threat Analysis and Assessment

2. Implementing a Security Plan

Part II: APEX Settings

3. Architecture

4. Instance Settings

5. Workspace Settings

6. Application Settings

7. Mobile Settings

Part III: User Access

8. User Management

9. User Authorization

Part IV: Data Access

10.Secure Export to CSV

11. Secure Views

12. VPD & OLS

13. Shadow Schema

14. Encryption

Conclusion

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews