The Expert Guide to Peoplesoft Security

Download The Expert Guide to Peoplesoft Security PDF Online Free

Author :
Publisher : iUniverse
ISBN 13 : 9781469723747
Total Pages : 112 pages
Book Rating : 4.7/5 (237 download)

DOWNLOAD NOW!


Book Synopsis The Expert Guide to Peoplesoft Security by : Jason D. Carter

Download or read book The Expert Guide to Peoplesoft Security written by Jason D. Carter and published by iUniverse. This book was released on 2004-07-14 with total page 112 pages. Available in PDF, EPUB and Kindle. Book excerpt: Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you. The Expert Guide to PeopleSoft Security provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. The Expert Guide to PeopleSoft Security provides knowledge and insight for Administrators, Managers, Developers and Users alike. The Expert Guide to PeopleSoft Security covers the topics essential to your success, including: Security Design, User Profile Setup, Role & Permission List Setup, Process Security, Query Security, Row Level Security (for HR and Financials), Portal Security, Security Migrations, Definition Security, LDAP Authentication, Password Controls, Dynamic Role Creation and more. Additionally it provides an indispensable reference to PeopleSoft Security Tables as well as SQL scripts to query the security information most requested from the system. All in all The Expert Guide to PeopleSoft Security provides a comprehensive look at one of the most misunderstood but essential parts of the PeopleSoft System. Is your system properly secured?

Information Technology Control and Audit, Fourth Edition

Download Information Technology Control and Audit, Fourth Edition PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1439893209
Total Pages : 779 pages
Book Rating : 4.4/5 (398 download)

DOWNLOAD NOW!


Book Synopsis Information Technology Control and Audit, Fourth Edition by : Sandra Senft

Download or read book Information Technology Control and Audit, Fourth Edition written by Sandra Senft and published by CRC Press. This book was released on 2012-07-18 with total page 779 pages. Available in PDF, EPUB and Kindle. Book excerpt: The new edition of a bestseller, Information Technology Control and Audit, Fourth Edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. Aligned to and supporting the Control Objectives for Information and Related Technology (COBIT), it examines emerging trends and defines recent advances in technology that impact IT controls and audits—including cloud computing, web-based applications, and server virtualization. Filled with exercises, review questions, section summaries, and references for further reading, this updated and revised edition promotes the mastery of the concepts and practical implementation of controls needed to manage information technology resources effectively well into the future. Illustrating the complete IT audit process, the text: Considers the legal environment and its impact on the IT field—including IT crime issues and protection against fraud Explains how to determine risk management objectives Covers IT project management and describes the auditor’s role in the process Examines advanced topics such as virtual infrastructure security, enterprise resource planning, web application risks and controls, and cloud and mobile computing security Includes review questions, multiple-choice questions with answers, exercises, and resources for further reading in each chapter This resource-rich text includes appendices with IT audit cases, professional standards, sample audit programs, bibliography of selected publications for IT auditors, and a glossary. It also considers IT auditor career development and planning and explains how to establish a career development plan. Mapping the requirements for information systems auditor certification, this text is an ideal resource for those preparing for the Certified Information Systems Auditor (CISA) and Certified in the Governance of Enterprise IT (CGEIT) exams. Instructor's guide and PowerPoint® slides available upon qualified course adoption.

Application Security Program Handbook

Download Application Security Program Handbook PDF Online Free

Author :
Publisher : Simon and Schuster
ISBN 13 : 163343981X
Total Pages : 294 pages
Book Rating : 4.6/5 (334 download)

DOWNLOAD NOW!


Book Synopsis Application Security Program Handbook by : Derek Fisher

Download or read book Application Security Program Handbook written by Derek Fisher and published by Simon and Schuster. This book was released on 2022-12-27 with total page 294 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book "teaches you to implement a robust program of security throughout your development process. It goes well beyond the basics, detailing flexible security fundamentals that can adapt and evolve to new and emerging threats. Its service-oriented approach is ... suited to the fast pace of modern development. Your team will quickly switch from viewing security as a chore to an essential part of their daily work. Follow the expert advice in this guide and you'll ... deliver software that is free from security defects and critical vulnerabilities"--Publisher marketing.

Software Security Engineering

Download Software Security Engineering PDF Online Free

Author :
Publisher : Addison-Wesley Professional
ISBN 13 : 0132702452
Total Pages : 368 pages
Book Rating : 4.1/5 (327 download)

DOWNLOAD NOW!


Book Synopsis Software Security Engineering by : Nancy R. Mead

Download or read book Software Security Engineering written by Nancy R. Mead and published by Addison-Wesley Professional. This book was released on 2004-04-21 with total page 368 pages. Available in PDF, EPUB and Kindle. Book excerpt: Software Security Engineering draws extensively on the systematic approach developed for the Build Security In (BSI) Web site. Sponsored by the Department of Homeland Security Software Assurance Program, the BSI site offers a host of tools, guidelines, rules, principles, and other resources to help project managers address security issues in every phase of the software development life cycle (SDLC). The book’s expert authors, themselves frequent contributors to the BSI site, represent two well-known resources in the security world: the CERT Program at the Software Engineering Institute (SEI) and Cigital, Inc., a consulting firm specializing in software security. This book will help you understand why Software security is about more than just eliminating vulnerabilities and conducting penetration tests Network security mechanisms and IT infrastructure security services do not sufficiently protect application software from security risks Software security initiatives should follow a risk-management approach to identify priorities and to define what is “good enough”–understanding that software security risks will change throughout the SDLC Project managers and software engineers need to learn to think like an attacker in order to address the range of functions that software should not do, and how software can better resist, tolerate, and recover when under attack

Halting the Hacker

Download Halting the Hacker PDF Online Free

Author :
Publisher : Prentice Hall Professional
ISBN 13 : 9780130464163
Total Pages : 388 pages
Book Rating : 4.4/5 (641 download)

DOWNLOAD NOW!


Book Synopsis Halting the Hacker by : Donald L. Pipkin

Download or read book Halting the Hacker written by Donald L. Pipkin and published by Prentice Hall Professional. This book was released on 2003 with total page 388 pages. Available in PDF, EPUB and Kindle. Book excerpt: Get into the hacker's mind--and outsmart him! Fully updated for the latest threats, tools, and countermeasures Systematically covers proactive, reactive, and preemptive security measures Detailed, step-by-step techniques for protecting HP-UX, Linux, and UNIX systems "Takes on even more meaning now than the original edition!" --Denny Georg, CTO, Information Technology, Hewlett-Packard Secure your systems against today's attacks--and tomorrow's. Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control--showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit--and attacks that haven't even been imagined yet. How hackers select targets, identify systems, gather information, gain access, acquire privileges, and avoid detection How multiple subsystems can be used in harmony to attack your computers and networks Specific steps you can take immediately to improve the security of any HP-UX, Linux, or UNIX system How to build a secure UNIX system from scratch--with specifics for HP-UX and Red Hat Linux Systematic proactive, reactive, and preemptive security measures Security testing, ongoing monitoring, incident response, and recovery--in depth Legal recourse: What laws are being broken, what you need to prosecute, and how to overcome the obstacles to successful prosecution About the CD-ROM The accompanying CD-ROM contains an extensive library of HP-UX and Linux software tools for detecting and eliminating security problems and a comprehensive information archive on security-related topics.

Essential Guide to PeopleSoft Development and Customization

Download Essential Guide to PeopleSoft Development and Customization PDF Online Free

Author :
Publisher : Manning Publications
ISBN 13 : 9781884777929
Total Pages : 1106 pages
Book Rating : 4.7/5 (779 download)

DOWNLOAD NOW!


Book Synopsis Essential Guide to PeopleSoft Development and Customization by : Tony DeLia

Download or read book Essential Guide to PeopleSoft Development and Customization written by Tony DeLia and published by Manning Publications. This book was released on 2000 with total page 1106 pages. Available in PDF, EPUB and Kindle. Book excerpt: This practical guide for both novice and experienced programmers includes details on design and development in a project life cycle. Online and batch development are also covered. This guide also provides customization alternatives of delivered online applications through real examples. Authors include Galina Landres, Isidor Rivera, and Prakash Sankaran.

Enterprise Software Security

Download Enterprise Software Security PDF Online Free

Author :
Publisher : Addison-Wesley Professional
ISBN 13 : 0321604369
Total Pages : 519 pages
Book Rating : 4.3/5 (216 download)

DOWNLOAD NOW!


Book Synopsis Enterprise Software Security by : Kenneth R. van Wyk

Download or read book Enterprise Software Security written by Kenneth R. van Wyk and published by Addison-Wesley Professional. This book was released on 2014-12-01 with total page 519 pages. Available in PDF, EPUB and Kindle. Book excerpt: STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER Traditional approaches to securing software are inadequate. The solution: Bring software engineering and network security teams together in a new, holistic approach to protecting the entire enterprise. Now, four highly respected security experts explain why this “confluence” is so crucial, and show how to implement it in your organization. Writing for all software and security practitioners and leaders, they show how software can play a vital, active role in protecting your organization. You’ll learn how to construct software that actively safeguards sensitive data and business processes and contributes to intrusion detection/response in sophisticated new ways. The authors cover the entire development lifecycle, including project inception, design, implementation, testing, deployment, operation, and maintenance. They also provide a full chapter of advice specifically for Chief Information Security Officers and other enterprise security executives. Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidance–and specific, high-value recommendations you can apply right now. COVERAGE INCLUDES: • Overcoming common obstacles to collaboration between developers and IT security professionals • Helping programmers design, write, deploy, and operate more secure software • Helping network security engineers use application output more effectively • Organizing a software security team before you’ve even created requirements • Avoiding the unmanageable complexity and inherent flaws of layered security • Implementing positive software design practices and identifying security defects in existing designs • Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance • Moving beyond pentesting toward more comprehensive security testing • Integrating your new application with your existing security infrastructure • “Ruggedizing” DevOps by adding infosec to the relationship between development and operations • Protecting application security during maintenance

Security Engineering

Download Security Engineering PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119642833
Total Pages : 1232 pages
Book Rating : 4.1/5 (196 download)

DOWNLOAD NOW!


Book Synopsis Security Engineering by : Ross Anderson

Download or read book Security Engineering written by Ross Anderson and published by John Wiley & Sons. This book was released on 2020-11-24 with total page 1232 pages. Available in PDF, EPUB and Kindle. Book excerpt: Now that there’s software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are – from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do – from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability – why companies build vulnerable systems and governments look the other way How dozens of industries went online – well or badly

8 Steps to Better Security

Download 8 Steps to Better Security PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119811244
Total Pages : 155 pages
Book Rating : 4.1/5 (198 download)

DOWNLOAD NOW!


Book Synopsis 8 Steps to Better Security by : Kim Crawley

Download or read book 8 Steps to Better Security written by Kim Crawley and published by John Wiley & Sons. This book was released on 2021-08-17 with total page 155 pages. Available in PDF, EPUB and Kindle. Book excerpt: Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Designing Secure Software

Download Designing Secure Software PDF Online Free

Author :
Publisher : No Starch Press
ISBN 13 : 1718501935
Total Pages : 330 pages
Book Rating : 4.7/5 (185 download)

DOWNLOAD NOW!


Book Synopsis Designing Secure Software by : Loren Kohnfelder

Download or read book Designing Secure Software written by Loren Kohnfelder and published by No Starch Press. This book was released on 2021-12-21 with total page 330 pages. Available in PDF, EPUB and Kindle. Book excerpt: What every software professional should know about security. Designing Secure Software consolidates Loren Kohnfelder’s more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the process. The book begins with a discussion of core concepts like trust, threats, mitigation, secure design patterns, and cryptography. The second part, perhaps this book’s most unique and important contribution to the field, covers the process of designing and reviewing a software design with security considerations in mind. The final section details the most common coding flaws that create vulnerabilities, making copious use of code snippets written in C and Python to illustrate implementation vulnerabilities. You’ll learn how to: • Identify important assets, the attack surface, and the trust boundaries in a system • Evaluate the effectiveness of various threat mitigation candidates • Work with well-known secure coding patterns and libraries • Understand and prevent vulnerabilities like XSS and CSRF, memory flaws, and more • Use security testing to proactively identify vulnerabilities introduced into code • Review a software design for security flaws effectively and without judgment Kohnfelder’s career, spanning decades at Microsoft and Google, introduced numerous software security initiatives, including the co-creation of the STRIDE threat modeling framework used widely today. This book is a modern, pragmatic consolidation of his best practices, insights, and ideas about the future of software.

Executive's Guide to Personal Security

Download Executive's Guide to Personal Security PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119574374
Total Pages : 256 pages
Book Rating : 4.1/5 (195 download)

DOWNLOAD NOW!


Book Synopsis Executive's Guide to Personal Security by : David A. Katz

Download or read book Executive's Guide to Personal Security written by David A. Katz and published by John Wiley & Sons. This book was released on 2020-01-22 with total page 256 pages. Available in PDF, EPUB and Kindle. Book excerpt: The proven safety tips and techniques for corporate executives, revised and updated The revised and updated second edition of Executive's Guide to Personal Security, 2nd Edition offers a strategic handbook for ensuring safety for executives, their employees, and their corporate assets. The book’s lessons outline the basic rules of personal security; it shows how to recognize and prepare for the real threats faced by executives and ordinary individuals in today’s often hostile world. It is filled with the necessary knowledge that can empower executives to face these threats and deal with them successfully. The methods outlined herein, formerly reserved for security professionals and government employees, are made available to the reader. Executive's Guide to Personal Security will teach you situational awareness which allows you to identify potential dangers before they become serious threats. You will learn how to analyze risks, prepare for emergencies, travel safely, and utilize counter-surveillance techniques to enable you to recognize if you are being followed or targeted. You will gain an understanding of the threats to both personal safety and corporate assets and understand how to implement the appropriate counter-measures to deal with those perceived threats. With Executive’s Guide to Personal Security, you can learn to take necessary actions to reduce your chances of becoming a target and discover how to make yourself less vulnerable. Written by two seasoned security experts, the lessons presented can be used by those in the business world as well as anyone who would like to feel more secure, including those traveling to foreign countries and individuals studying abroad. New to the second edition is: Information for responding to an active shooter incident Enhanced details for protecting IP and computers and smart phones Strategies for planning for emergencies at home and the office Approaches to safety that meet the challenges of today’s world Executive's Guide to Personal Security, 2nd Edition is the comprehensive book that contains information on physical security, principles of route selection, technical security systems, hostage situations, emergency planning, hotel and room selection, armored products, communications, bomb threats, evacuations, and local criminal hazards.

Improving Web Application Security

Download Improving Web Application Security PDF Online Free

Author :
Publisher : Microsoft Press
ISBN 13 :
Total Pages : 964 pages
Book Rating : 4.X/5 (4 download)

DOWNLOAD NOW!


Book Synopsis Improving Web Application Security by :

Download or read book Improving Web Application Security written by and published by Microsoft Press. This book was released on 2003 with total page 964 pages. Available in PDF, EPUB and Kindle. Book excerpt: Gain a solid foundation for designing, building, and configuring security-enhanced, hack-resistant Microsoft® ASP.NET Web applications. This expert guide describes a systematic, task-based approach to security that can be applied to both new and existing applications. It addresses security considerations at the network, host, and application layers for each physical tier—Web server, remote application server, and database server—detailing the security configurations and countermeasures that can help mitigate risks. The information is organized into sections that correspond to both the product life cycle and the roles involved, making it easy for architects, designers, and developers to find the answers they need. All PATTERNS & PRACTICES guides are reviewed and approved by Microsoft engineering teams, consultants, partners, and customers—delivering accurate, real-world information that’s been technically validated and tested.

Software Security Engineering: A Guide for Project Managers

Download Software Security Engineering: A Guide for Project Managers PDF Online Free

Author :
Publisher :
ISBN 13 : 9780321559685
Total Pages : 315 pages
Book Rating : 4.5/5 (596 download)

DOWNLOAD NOW!


Book Synopsis Software Security Engineering: A Guide for Project Managers by : Julia H. Allen

Download or read book Software Security Engineering: A Guide for Project Managers written by Julia H. Allen and published by . This book was released on 2008 with total page 315 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Peoplesoft HRMS Reporting

Download Peoplesoft HRMS Reporting PDF Online Free

Author :
Publisher : Pearson Education
ISBN 13 : 0137015704
Total Pages : 705 pages
Book Rating : 4.1/5 (37 download)

DOWNLOAD NOW!


Book Synopsis Peoplesoft HRMS Reporting by : Adam T. Bromwich

Download or read book Peoplesoft HRMS Reporting written by Adam T. Bromwich and published by Pearson Education. This book was released on 1999-09-09 with total page 705 pages. Available in PDF, EPUB and Kindle. Book excerpt: Make your company's PeopleSoft investment pay off! Create the accurate, insightful reports you need, first time, every time, with PeopleSoft HRMS Reporting-the only complete guide to PeopleSoft reporting. The Complete and Authoritative Guide to Retrieving Data from PeopleSoft's Human Resource Management System PeopleSoft specialist Adam Bromwich presents authoritative guidance on the successful design of PeopleSoft HRMS databases and reports for superior performance, ease of use, and value. Learn how the PeopleSoft database is organized-functionally and technically; review its key tables; and understand how PeopleSoft's online capabilities are linked to the relational database beneath them. Discover how you can: Access your data directly, using Structured Query Language (SQL) and via PeopleSoft's powerful Structured Query Reports (SQR) language Design better tables and reports for HR, Payroll, and Benefits Construct more comprehensive queries Avoid expensive pitfalls in PeopleSoft table design Bromwich reveals the hidden decisions PeopleSoft HR developers must make. How does calculating a payroll affect paycheck data? When does an effective dated table cause major headaches? Where is the accurate data stored and which tables should be left alone? You'll find common routines for retrieving functional data, techniques for slashing costly debugging and maintenance, and much more. PeopleSoft HRMS Reporting is the only independent guide to real-world PeopleSoft reporting. And it's based on the unmatched experience of one of the world's leading PeopleSoft experts.

Security, Audit and Control Features PeopleSoft

Download Security, Audit and Control Features PeopleSoft PDF Online Free

Author :
Publisher : It Governance Institute
ISBN 13 : 9781893209619
Total Pages : 272 pages
Book Rating : 4.2/5 (96 download)

DOWNLOAD NOW!


Book Synopsis Security, Audit and Control Features PeopleSoft by :

Download or read book Security, Audit and Control Features PeopleSoft written by and published by It Governance Institute. This book was released on 2004-01-01 with total page 272 pages. Available in PDF, EPUB and Kindle. Book excerpt:

PeopleSoft for the Oracle DBA

Download PeopleSoft for the Oracle DBA PDF Online Free

Author :
Publisher : Apress
ISBN 13 : 1430237082
Total Pages : 540 pages
Book Rating : 4.4/5 (32 download)

DOWNLOAD NOW!


Book Synopsis PeopleSoft for the Oracle DBA by : David Kurtz

Download or read book PeopleSoft for the Oracle DBA written by David Kurtz and published by Apress. This book was released on 2012-03-02 with total page 540 pages. Available in PDF, EPUB and Kindle. Book excerpt: PeopleSoft for the Oracle DBA, Second Edition stands on the boundary between the PeopleSoft application and the Oracle database. This new edition of David Kurtz's book is freshly revised, showing how to tame the beast and manage Oracle successfully in a PeopleSoft environment. You’ll learn about PeopleSoft’s Internet architecture and its use of Oracle’s Tuxedo Application Server. You’ll find full coverage of key database issues such as indexing, connectivity, and tablespace usage as they apply to PeopleSoft. Kurtz also provides some of the best advice and information to be found anywhere on managing and troubleshooting performance issues in a PeopleSoft environment. The solid coverage of performance troubleshooting is enough by itself to make PeopleSoft for the Oracle DBA a must-have book for any Oracle Database administrator working in support of a PeopleSoft environment. Explains PeopleSoft’s technical architecture as it relates to Oracle Database Demonstrates how to instrument and measure the performance of PeopleSoft Provides techniques to troubleshoot and resolve performance problems

PeopleSoft PeopleTools: Mobile Applications Development (Oracle Press)

Download PeopleSoft PeopleTools: Mobile Applications Development (Oracle Press) PDF Online Free

Author :
Publisher : McGraw Hill Professional
ISBN 13 : 0071837760
Total Pages : 497 pages
Book Rating : 4.0/5 (718 download)

DOWNLOAD NOW!


Book Synopsis PeopleSoft PeopleTools: Mobile Applications Development (Oracle Press) by : Jim J. Marion

Download or read book PeopleSoft PeopleTools: Mobile Applications Development (Oracle Press) written by Jim J. Marion and published by McGraw Hill Professional. This book was released on 2015-10-27 with total page 497 pages. Available in PDF, EPUB and Kindle. Book excerpt: Distribute compelling, device-neutral applications throughout your mobile computing environment using the expert instruction contained in this Oracle Press guide. PeopleSoft PeopleTools: Mobile Applications Development fully explains the latest programming methods and features detailed examples and ready-to-use code samples. Find out how to configure your workstation, start building PeopleSoft mobile applications, incorporate REST and Web services, use Oracle and third-party development utilities, and build high-performance hybrid applications. Performance tuning, troubleshooting, and security are covered in this comprehensive resource. Work with the PeopleSoft Mobile Application Platform and Fluid Application Designer Customize layout and appearance using collection items and CSS Create and deploy HTML5-based mobile applications Connect HTML5 programs to PeopleSoft through REST services Design mobile user interfaces with jQuery Mobile and AngularJS Construct Android-specific native applications using Eclipse and ADT Use Apache Cordova to assemble applications from HTML, CSS, and JavaScript components Develop hybrid applications from the Oracle Mobile Application Framework