Title | Summary | File | |
---|---|---|---|
An Introduction to SQL Injection Attacks for Oracle Developers |
Most application developers underestimate the risk of SQL injections attacks against web applications that use Oracle as the back-end database.... |
Security Resources | File |
Oracle Applications Password Decryption |
Most Oracle Applications 11i implementations are vulnerable to a significant security weakness in the encryption of passwords within the... |
Security Resources | File |
Integrigy Guide to Auditing and Logging in Oracle E-Business Suite |
Most Oracle E-Business Suite implementations do not fully take advantage of the auditing and logging features. These features are sophisticated... |
Security Resources | File |
Evading Network-Based Oracle Database Intrusion Detection Systems |
With the advent of legislative mandates like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA), the... |
Security Resources | File |