Abstract
If you have read every other chapter in this book, you should have a relatively good grasp on what needs to be done to properly secure an APEX application. Each previous chapter focused on proper settings, planning, or techniques that, when implemented, will provide a solid and secure foundation for your applications. These techniques include things such as authentication, authorization, data security, and tamper-proofing an application. The common thread with these techniques is that they are designed to manage the day-to-day, normal, secure operations of your applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2013 Scott Spendolini
About this chapter
Cite this chapter
Spendolini, S. (2013). Encryption. In: Expert Oracle Application Express Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-4732-6_14
Download citation
DOI: https://doi.org/10.1007/978-1-4302-4732-6_14
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-4731-9
Online ISBN: 978-1-4302-4732-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)