O'Reilly logo

Applied Oracle Security by Bryan Wise, Richard Wark, Patrick Sack, Tyler Muth, Hamza Jahangir, Scott Gaetjen, David Knox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 6 Applied Database Vault for Custom Applications

This chapter introduces design techniques and patterns for DBV security controls that will be incorporated into the process of creating a new application. We first introduce a notional database application environment that is used to describe design techniques for analyzing the applications in this environment. The analysis will uncover opportunities for you to apply DBV security controls. The design techniques include documentation components, rules, and patterns that will be applied during the design phase of new database application.

We encourage you to think about database security at the beginning of the application design phase and understand the importance of considering a DBV security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required