Scott Spendolini, Sumneva
WikiLeaks has dramatically changed how organizations deal with data security. Without getting into the politics, this session will discuss how to mitigate data breaches in your APEX applications. It will follow your data through its “chain of custody”, and provide insights on securing it at each step. It will cover not only things to do within the APEX application itself, but also steps to take at the database & even desktop PC level.
Become a member of ODTUG to gain access to more than 12,500 files in our technical database.
- Not a member? Click through to the topic of interest to browse a list of available presentations.
- Already a member? Log-in here to access the full database
Click here to see the Full Techincal Resource Database