O'Reilly logo

Oracle APEX Best Practices by Learco Brizzi, Iloon Ellen-Wolff, Alex Nuijten

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security considerations for the developer

From the first day of a project, you should be thinking about security. Each piece of code has consequences for security. So, each piece of code should be reviewed carefully for security vulnerabilities. In practice, we very often consider security an "after thought". Only after making security mistakes do we start to think about it.

Browser attacks

The different browser attack methods are discussed in this section.

Cross-site scripting (XSS)

Cross-site scripting (also referred to as XSS) is a security breach that takes advantage of dynamically generated Web pages.

Cross-site scripting is "injection" of Java script. This may be in the database, URL, or an upload from files. XSS is often not that dangerous ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required