Book Image

Oracle APEX Best Practices

Book Image

Oracle APEX Best Practices

Overview of this book

Have you ever wanted to create real-world database applications? In this book you're not only getting APEX best practices, but will also take into account the total environment of an APEX application and benefit from it."Oracle APEX Best Practices" will guide you through the development of real-world applications. It will give you a broader view of APEX. The various aspects include setting up APEX environment, testing and debugging, security, and getting the best out of SQL and PL/SQL.In six distinct chapters you will learn about different features of Oracle APEX as well as SQL and PL/SQL.Do you maximize the capabilities of Oracle APEX? Do you use all the power that SQL and PL/SQL have to offer? Do you want to learn how to build a secure, fully functional application? Then this is the book you'll need. "Oracle APEX: Best Practices" is where practical development begins!
Table of Contents (14 chapters)
Oracle APEX Best Practices
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 4. Security

The main question is: How secure is "Secure Enough"?

The answer to this question depends on what you're protecting, who you are protecting it from, and the likelihood of someone wanting to steal what you are protecting. You also need to understand the repercussions you would face if someone was able to successfully steal the things you are protecting. To summarize, you need to think about the questions: Who/what/how can data be accessed?

The definition of security is subjective. My idea of security may be different from yours as a reader of this book. In my view, the secured data can only be seen and edited by people who are qualified and authorized, and that data is protected from people who are not.

Security must be designed into applications from the outset, starting with database design, continuing through application design, development, and testing, and finally with implementation and training. So, plan security and the architecture, and make sure people know the security...