Database Reference
In-Depth Information
•
Testing with new applications, users and administrators
•
Responding to an emergency - securing a new application and data
•
Changing all the passwords
•
Auditing and logging
•
Performing an asset-centric risk assessment
•
Tailoring installation and implementation
I encourage you to work on these issues, and I hope you have complete success in Application Security
using Oracle and Java! Having finished this topic, you are now the expert in Oracle and Java security.