Book Image

Oracle APEX Best Practices

Book Image

Oracle APEX Best Practices

Overview of this book

Have you ever wanted to create real-world database applications? In this book you're not only getting APEX best practices, but will also take into account the total environment of an APEX application and benefit from it."Oracle APEX Best Practices" will guide you through the development of real-world applications. It will give you a broader view of APEX. The various aspects include setting up APEX environment, testing and debugging, security, and getting the best out of SQL and PL/SQL.In six distinct chapters you will learn about different features of Oracle APEX as well as SQL and PL/SQL.Do you maximize the capabilities of Oracle APEX? Do you use all the power that SQL and PL/SQL have to offer? Do you want to learn how to build a secure, fully functional application? Then this is the book you'll need. "Oracle APEX: Best Practices" is where practical development begins!
Table of Contents (14 chapters)
Oracle APEX Best Practices
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Security considerations for the developer


From the first day of a project, you should be thinking about security. Each piece of code has consequences for security. So, each piece of code should be reviewed carefully for security vulnerabilities. In practice, we very often consider security an "after thought". Only after making security mistakes do we start to think about it.

Browser attacks

The different browser attack methods are discussed in this section.

Cross-site scripting (XSS)

Cross-site scripting (also referred to as XSS) is a security breach that takes advantage of dynamically generated Web pages.

Cross-site scripting is "injection" of Java script. This may be in the database, URL, or an upload from files. XSS is often not that dangerous on its own, but when combined with bugs in a browser, a virus, or a worm, it can be serious. In most cases, the application express developer of the application is unaware of the issue, and it goes undetected for a long time.

An attacker injects JavaScript...