Virtual Private Database

  • Scott Spendolini


Using the secure views technique outlined in Chapter 10 can go a long way with quickly and affordably securing data in APEX applications and other applications. However, it does have some limitations that cannot be easily overcome.


Data Security Application Context Business Rule Policy Function Page View 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Scott Spendolini 2013

Authors and Affiliations

  • Scott Spendolini

There are no affiliations available

Personalised recommendations