Following the book's paradigm, "identify the problem first and propose the adequate solution (pattern)", we spent a lot of time discussing security threats, risks, and attack types. We only regret that, in this format, we cannot elaborate more on hackers' techniques. Nevertheless, forewarned is forearmed. You are now equipped with some of the most common and dangerous tricks. You have a list of essential Oracle tools and fundamentally, you know how to combine them in defensive and preventive patterns.
Practically, any attacks start from "reconnaissance missions" to obtain the critical information from regular or fault responses, error logs, dumps, and so on. Therefore, the next chapter will be dedicated to fault handling frameworks and will logically continue the security frameworks requirements in regard to error catching, shielding, prevention, and recovery.