Chapter 11. Securing JavaStop Using Database Security and Firewalls

In this chapter

  • Understanding Security Challenges

  • Understanding Firewalls

  • Understanding the Oracle Advanced Security Option

  • Authenticating Connections to JavaStop

  • Securing the FSTP Database

  • Securing Applications

  • Understanding Definer and Invoker Rights

Get e-Commerce Applications Using Oracle8i and Java from Scratch now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.