O'Reilly logo

Expert Oracle Application Express Security by Scott Spendolini

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7

image

Application Threats

If only it were as simple as configuring a few application-level options to completely secure your application. This is clearly not the case because there are many attack vectors that a malicious user will attempt to take in order to compromise your application. Typically, these attacks involve passing malicious values or strings to an otherwise valid component of an application, such as a form or the URL. The malicious user then relies on the fact that the developer did not take enough precautions to ensure that the malicious code is properly neutralized. If that is the case, then the attack is successful, and the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required