Summary

Following the book's paradigm, "identify the problem first and propose the adequate solution (pattern)", we spent a lot of time discussing security threats, risks, and attack types. We only regret that, in this format, we cannot elaborate more on hackers' techniques. Nevertheless, forewarned is forearmed. You are now equipped with some of the most common and dangerous tricks. You have a list of essential Oracle tools and fundamentally, you know how to combine them in defensive and preventive patterns.

Practically, any attacks start from "reconnaissance missions" to obtain the critical information from regular or fault responses, error logs, dumps, and so on. Therefore, the next chapter will be dedicated to fault handling frameworks and ...

Get Applied SOA Patterns on the Oracle Platform now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.