Chapter 11. Securing JavaStop Using Database Security and Firewalls
In this chapter
Understanding Security Challenges
Understanding Firewalls
Understanding the Oracle Advanced Security Option
Authenticating Connections to JavaStop
Securing the FSTP Database
Securing Applications
Understanding Definer and Invoker Rights
Get e-Commerce Applications Using Oracle8i and Java from Scratch now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.