Title | Summary | File | |
---|---|---|---|
Deploying Oracle E-Business Suite 12.2 SOAP Web Services |
This is the fifth posting in a blog series summarizing the new Oracle E-Business Suite 12.2 Mobile and web services functionality and... |
Oracle Security Blog | |
Integrigy COLLABORATE 17 Sessions - Presentations on Oracle Database, Oracle E-Business Suite, and PeopleSoft Security |
Integrigy is presenting nine papers this year at COLLABORATE 17 (... |
Oracle Security Blog | |
Integrigy COLLABORATE 17 Sessions - OAUG, IOUG, and Quest |
Integrigy is presenting nine papers this year at COLLABORATE 17 (... |
Whitepapers and Presentations | File |
PeopleSoft Security |
This is a quick summary of Integrigy’s latest research on PeopleSoft. Was sending this to a client and decided it was a good posting: ... |
Whitepapers and Presentations, Oracle Security Blog | |
Deploying Oracle E-Business Suite 12.2 REST Web Services |
This is the forth posting in a blog series summarizing the new Oracle E-Business Suite 12.2 Mobile and web services functionality and... |
Oracle Security Blog | |
Guide to PeopleSoft Logging and Auditing |
Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy... |
Whitepapers and Presentations | File |
How to Control and Secure Your DBAs and Developers in PeopleSoft |
... |
Security Resources | File |
Deploying Oracle E-Business Suite Web Services |
This is the third posting in a blog series summarizing the new Oracle E-Business Suite 12.2 Mobile and web services functionality and... |
Oracle Security Blog | |
Oracle E-Business Suite 12.2 Mobile and Web Services Architecture |
This is the second posting in a blog series summarizing the new Oracle E-Business Suite 12.2 Mobile and web services functionality and... |
Oracle Security Blog | |
Oracle E-Business Suite Mobile and Web Services Security - What You Need To Know |
Securing packaged software such as the Oracle E-Business Suite presents different challenges than securing bespoke custom software. Unlike custom... |
Oracle Security Blog |