Book Image

Developing Robust Date and Time Oriented Applications in Oracle Cloud

By : Michal Kvet
Book Image

Developing Robust Date and Time Oriented Applications in Oracle Cloud

By: Michal Kvet

Overview of this book

Proper date and time management is critical for the development and reliability of Oracle Databases and cloud environments, which are among the most rapidly expanding technologies today. This knowledge can be applied to cloud technology, on premises, application development, and integration to emphasize regional settings, UTC coordination, or different time zones. This practical book focuses on code snippets and discusses the existing functionalities and limitations, along with covering data migration to the cloud by emphasizing the importance of proper date and time management. This book helps you understand the historical background and evolution of ANSI standards. You’ll get to grips with data types, constructor principles, and existing functionalities, and focus on the limitations of regional parameters and time zones, which help in expanding business to other parts of the world. You’ll also explore SQL injection threats, temporal database architecture, using Flashback Technology to reconstruct valid database images from the past, time zone management, and UTC synchronization across regions. By the end of this book, you’ll be able to create and manage temporal systems, prevent SQL injection attacks, use existing functionalities and define your own robust solutions for date management, and apply time zone and region rules.
Table of Contents (26 chapters)
1
Part 1: Discovering Oracle Cloud
4
Part 2: Understanding the Roots of Date and Time
7
Part 3: Modeling, Storing, and Managing Date and Time
12
Part 4: Modeling Validity Intervals
17
Part 5: Building Robust and Secure Temporal Solutions
20
Part 6: Expanding a Business Worldwide Using Oracle Cloud

Part 5: Building Robust and Secure Temporal Solutions

You already know, for sure, that integrity and overall state consistency are secured by transactions in relational systems. Each transaction creates a transaction log, consisting, among other critical information stored there, of change vectors storing original and new values for each changed data row. Thus, by extracting relevant transactional data using Flashback Technology, table content as it existed in the past can be obtained and reconstructed.

Chapter 14 highlights a significant security issue, SQL injection. This threat is formed of SQL code concatenation, which is then treated as a character string. You may have thought that working with date and time is safe, with the whole process secured by constructor and conversion functions, but that's not quite the case. You will come to understand the issue of complexity, as well as techniques to create secure solutions.

This part has the following chapters:

    ...