O'Reilly logo

Applied Oracle Security by Bryan Wise, Richard Wark, Patrick Sack, Tyler Muth, Hamza Jahangir, Scott Gaetjen, David Knox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 1Security Blueprints and New Thinking

Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful.

Database and application security form one end of the computer security field. These two areas are closely aligned because of the heavy and obvious relationship between applications and databases. Along with other areas of security, database and application security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required