tailieunhanh - Expert Oracle and Java Security

Every day I read e-mails and articles dealing with computer security attacks and breaches, and the repercussions that follow. I have been getting onboard with computer security for decades, and there is no end in sight for this effort. Each and every professional in information technology has a commitment to keep with regard to computer security. We have, most of us, signed computing codes of conduct, and further we have aligned ourselves with those who protect the computing resources of our respective companies | THE EXPERT S VOICE IN ORACLE Expert Oracle and Java Security Programming Secure Oracle Database Applications With Java PRACTICE A HOLISTIC VIEW TO SECURITY THAT PROTECTS PRECIOUS DATA ON THE CLIENT ON THE SERVER AND WHILE MOVING IN BETWEEN David Coffin - Apress For your convenience Apress has placed some of the front matter material after the index. Please use the Bookmarks and Contents at a Glance links to access them. Contents at a Glance About the About the Technical Chapter 1 Chapter 2 Oracle Database Chapter 3 Secure Java Development Chapter 4 Java Stored Chapter 5 Public Key Chapter 6 Secret Password Chapter 7 Data Encryption in Chapter 9 Two-Factor Chapter 10 Application Chapter 11 Enhancing Chapter 12 Administration of Appendix A List of Methods from OracleJavaSecure Appendix B Oracle Procedures Functions and Triggers for Oracle and Java .

TỪ KHÓA LIÊN QUAN