Title Summary File
An Introduction to SQL Injection Attacks for Oracle Developers

Most application developers underestimate the risk of SQL injections attacks against web applications that use Oracle as the back-end database....

Security Resources File
Oracle Applications Password Decryption

Most Oracle Applications 11i implementations are vulnerable to a significant security weakness in the encryption of passwords within the...

Security Resources File
Integrigy Guide to Auditing and Logging in Oracle E-Business Suite

Most Oracle E-Business Suite implementations do not fully take advantage of the auditing and logging features. These features are sophisticated...

Security Resources File
Evading Network-Based Oracle Database Intrusion Detection Systems

With the advent of legislative mandates like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA), the...

Security Resources File

Pages