Question: The JDBC tutorials has an example of this. Firstly, unless you're using the same credentials in each environment (DEV, QA, UAT/SIT, PROD, etc.), these probably

The JDBC tutorials has an example of this. Firstly, unless you're using the same credentials in each environment (DEV, QA, UAT/SIT, PROD, etc.), these probably shouldn't be in a file. But I realize it's being done for the sake of demonstrating how a connection string might be sent from a java application.

Question: does anyone have any thoughts on better ways of securing these credentials while still transmitting a connection string?

/////////////////////////////

Question : What are some of the ways you think robust, well-designed code relates to software security?

please explain in you own words

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!