Applied Oracle Security: Developing Secure Database and Middleware Environments- P63:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | 594 Applied Oracle Security ANY privileges 97 125 AOS_COMMON_AUDIT_TRAIL view 290 Apache 451 APEX Application Express 5 434-459 462-496 architecture 435-437 Audit Vault reports and 80 authentication schemes 462-468 authorization schemes 468-471 components and configurations 434 cross-site scripting and 476-478 database connections and 436-437 database roles and 437-438 Database Vault and 457-459 fine-grained auditing and 489-496 item-based policy 484-486 mod_rewrite and 447-449 mod_security and 449-451 network topology 445-447 password protection 445 463-468 482 preventing unauthorized access to 443-444 Runtime Only installation of 443-444 schema protection 456-459 security settings 439-443 sessions 438-439 SQL injection attacks and 472-476 SSL TLS techniques 451-456 summaries of 459 496 URL tampering and 478-483 VPD integration with 484-489 web-based attack prevention 449-451 XSS attacks and 476-478 APEX_ADMINISTRATOR_ROLE 440 APEX_INSTANCE_ADMIN package 440 APEX_PUBLIC_USER schema 445 490-491 application accounts 229 243-244 application administrators developers 18 235-239 creating roles for 245-262 privileges granted to 235-236 separation of duties for 236-239 application code factors used in 223-224 See also PL SQL routines SQL statements application data analyst 237 259-262 application data manager 236 256-259 299 application DBA pattern 132-135 application design command rules and 267-280 factors and 209-224 importance of security in 200 284 notional architecture for 200-202 object-owner accounts and 229-231 realms and 224-228 SARs and 281-284 secure schemas under DBV 228-231 239-267 security profiles and 202 205-209 use cases and scenarios 202-205 user access accounts and 231-239 Application Express. See APEX application maintenance administrator 236 252-256 299 application security 4 200 application security administrator 236 246-252 EUS-based 303 305 privileges granted to 299 applications DBV applied to existing 288 352-353 factors incorporated into .