• Complain

David Coffin [David Coffin] - Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java

Here you can read online David Coffin [David Coffin] - Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2011, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

David Coffin [David Coffin] Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java
  • Book:
    Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2011
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. Youll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords.

Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert.

  • Helps you protect against data loss, identity theft, SQL injection, and address spoofing

  • Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor

  • Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more

What youll learn

  • Guard against data loss, identity theft, SQL Injection, and to address spoofing

  • Protect sensitive data through encryption, both on disk and on the wire

  • Control access to data using secure roles, single sign-on, proxy connections, and two-factor authentication

  • Protect sensitive source ode through randomization, obfuscation, and wrapping

  • Thwart attempts at SQL injection and other common attacks

  • Manage constraints on the visibility of data and the scope of access

Who this book is for

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java is for every Java developer who uses an Oracle database. It is also for every Oracle database administrator or PL/SQL programmer who supports Java client and web applications. Whatever role you play in developing and supporting Java and Oracle applications, you need to address computer, application, data, and identity security. This book offers the tools youll need to effectively manage security across all aspects of the applications you support.

David Coffin [David Coffin]: author's other books


Who wrote Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java? Find out the surname, the name of the author of the book and a list of all author's works by series.

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
About the Author

David Coffin has over 30 years experience in multi-platform network - photo 1Picture 2David Coffin has over 30 years' experience in multi-platform network integration and systems programming. He has worked for large government contractors throughout his career. As a perpetual student, he has earned one Master's degree and has started a couple others. As a family man, he has raised eight children. David is a tri-athlete and distance swimmer who competes in the middle of the pack. He is also a classical guitar player, but he's not quitting his day job.

About the Technical Reviewer

Josh Juneau has been developing software since the mid-1990s Database - photo 3Picture 4Josh Juneau has been developing software since the mid-1990s. Database application programming has been the focus of his career since the beginning. He is an Oracle database administrator and has adopted the PL/SQL language for performing administrative tasks and developing applications for Oracle database. As his skills evolved, he began to incorporate Java into his PL/SQL applications, and later began to develop stand-alone applications in Java. During his tenure as a developer, he has combined his knowledge of PL/SQL and Java to develop robust Oracle database applications that harness the great features offered by both technologies. He has extended his knowledge of the JVM by learning and developing applications with other JVM languages, such as Jython and Groovy. Since 2006, Josh has been the editor and publisher for the Jython Monthly newsletter. In late 2008, he began a podcast dedicated to the Jython programming language. Josh was the lead author for The Definitive Guide to Jython, and Oracle PL/SQL Recipes, both published by Apress. He is the lead for the Django-Jython project (http://code.google.com/p/django-jython/). He loves to spend time with his four wonderful kids and excellent wife. To hear more from Josh, follow his blog at http://jj-blogger.blogspot.com. You can also follow him on Twitter via @javajuneau.

Acknowledgments

Writing this book was as much about expressing who I am as it is about the work I do. It was on New Year's Eve, 2009 that I decided I would write 100 pages of my own creation during 2010. I started writing an autobiography, but that turned out to be too complex. I have read Benjamin Franklin's autobiography, and maybe one day I will be that concise.

I decided to write about something that I think about day in and day out: computer security. Thankfully, I have one family member who gets this stuffmy son Matthew. Thank you, Matthew, for taking an interest and giving me encouragement. Also, thanks again for getting me through my refresher course on differential equations, 30 years after finishing college. You tutor me and I mentor you, all right big guy?

I wouldn't have gotten very far without the encouragement of my wife, Linda. I guess she sees the ideas bouncing around in my head, because she has always encouraged me to write. She claims I'll be like Emily Dickinson and have my writings published only after I die. Linda, I hope this assuages your concerns about sorting through my notebooks when I'm gone. Thanks for loving me through this process!

Kids, thanks for putting up with your dad's time on the computer. I love you!

I have had many technical mentors on the job. Many folks were willing to share their ideas and understanding with me, and also let me run with my own thoughts. Among my best mentors were my peers in the Intranet Development Group. I'm glad I have this opportunity to tell you guys how much you expanded my horizons during our time as a development team. I'm very glad we spent time in the Skunk Works together. A special thanks to our Fearless Leaderyour ideas for application authentication came together into Chapter 10 of this book.

I also want to thank God. He has given me natural abilities in computer administration and security, and he has been my source of peace and joy for as long as I've known Him, and even before.

A P P E N D I X A
List of Methods from OracleJavaSecure Class

A P P E N D I X B Oracle Procedur - photo 5

A P P E N D I X B Oracle Procedures Functions and Triggers for Oracle and Java - photo 6

A P P E N D I X B Oracle Procedures Functions and Triggers for Oracle and Java - photo 7

A P P E N D I X B Oracle Procedures Functions and Triggers for Oracle and Java - photo 8

A P P E N D I X B
Oracle Procedures, Functions and Triggers for Oracle and Java Security

Expert Oracle and Java Security Programming Secure Oracle Database Applications with Java - photo 9

C H A P T E R 1 Introduction - photo 10

C H A P T E R 1 Introduction This book is a walk through Oracle and Java - photo 11

C H A P T E R 1 Introduction This book is a walk through Oracle and Java - photo 12

C H A P T E R 1 Introduction This book is a walk through Oracle and Java - photo 13

C H A P T E R 1
Introduction

This book is a walk through Oracle and Java technology. I will weave the story of Oracle Database and Java security on the loom of these pages. The particular thread we will weave is code. This is a story for programmers.

This story will take you through several large tasks to help you start securing your Oracle applications. We will not be building any specific application, but will focus on the security aspects in building an application. In order to make this learning effort feel like a practical application, we will apply our efforts to the HR sample schema that is available with the Oracle Database 11g installation.

I hope to maintain a conversational tone, because I want to teach the concepts of secure programming. We are going to have the talk about secure programming. When you have read this book, you will be well equipped for the most difficult application programmer assignment of our day: defending our applications and computers.

C H A P T E R 2
Oracle Database Security

As you might imagine, the subject of this chapter could fill a whole book, or even several, if I tried to cover the entire scope of Oracle security. Instead, I will cover the essentials, and also some particular aspects of Oracle security to which a programmer can relate. An example of essential Oracle security is using roles and granting privileges to those roles. An example of a programmer's extension of Oracle security is secure application roles.

The basic goals of this chapter are as follows:

  • Create two users: a security administrator user and an application security user. These users will be granted privileges and delegated responsibilities for achieving application security.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java»

Look at similar books to Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java»

Discussion, reviews of the book Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.