Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Oracle APEX Best Practices
  • Table Of Contents Toc
  • Feedback & Rating feedback
Oracle APEX Best Practices

Oracle APEX Best Practices

4.3 (6)
close
close
Oracle APEX Best Practices

Oracle APEX Best Practices

4.3 (6)

Overview of this book

Have you ever wanted to create real-world database applications? In this book you're not only getting APEX best practices, but will also take into account the total environment of an APEX application and benefit from it."Oracle APEX Best Practices" will guide you through the development of real-world applications. It will give you a broader view of APEX. The various aspects include setting up APEX environment, testing and debugging, security, and getting the best out of SQL and PL/SQL.In six distinct chapters you will learn about different features of Oracle APEX as well as SQL and PL/SQL.Do you maximize the capabilities of Oracle APEX? Do you use all the power that SQL and PL/SQL have to offer? Do you want to learn how to build a secure, fully functional application? Then this is the book you'll need. "Oracle APEX: Best Practices" is where practical development begins!
Table of Contents (14 chapters)
close
close
Oracle APEX Best Practices
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
1
Database Cloud Service and APEX 4.2
2
Index

Chapter 4. Security

The main question is: How secure is "Secure Enough"?

The answer to this question depends on what you're protecting, who you are protecting it from, and the likelihood of someone wanting to steal what you are protecting. You also need to understand the repercussions you would face if someone was able to successfully steal the things you are protecting. To summarize, you need to think about the questions: Who/what/how can data be accessed?

The definition of security is subjective. My idea of security may be different from yours as a reader of this book. In my view, the secured data can only be seen and edited by people who are qualified and authorized, and that data is protected from people who are not.

Security must be designed into applications from the outset, starting with database design, continuing through application design, development, and testing, and finally with implementation and training. So, plan security and the architecture, and make sure people know the security...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Oracle APEX Best Practices
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon