O'Reilly logo

Applied Oracle Security by Bryan Wise, Richard Wark, Patrick Sack, Tyler Muth, Hamza Jahangir, Scott Gaetjen, David Knox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 11Web-centric Security in APEX

In this chapter, we look at the Application Express (APEX) architecture and how to configure it securely. This chapter focuses on solutions at the installation and configuration level. The next chapter is dedicated to secure coding practices.

Introduction to the APEX Environment

APEX is a web development environment that lives completely inside the database. Understanding the APEX environment—both development and runtime—is critical to your understanding of how to secure it. Client-server developers have worked in environments in which each user connects to the database as a true database user or schema. Web developers working with technologies such as Java 2 Platform, Enterprise Edition (J2EE) are accustomed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required