CHAPTER15
SQL Injection and Code Security
Once again, let’s ponder the question posed at the beginning of Chapter 14. What is the biggest threat to data security?
Security in databases used to be a DBA-only activity. Back in those days, the databases used to be islands processing batch applications. With the advent of online processing, and the ever-increasing importance of interactive data, ease of access takes the center stage in most system development. Unfortunately, that’s where the clash with the concepts of security occurs. Some see the need to make data easily accessible and coding even easier—especially with the now-popular agile programming ...
Get Real World SQL and PL/SQL: Advice from the Experts now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.