This document discusses secure coding practices for PL/SQL applications. It begins by covering common security problems in PL/SQL code like injection vulnerabilities. It then demonstrates how to find security issues like sinks and sources in code. The document emphasizes the importance of limiting access to code and data as well as following secure coding standards. Finally, it explores options for protecting intellectual property in PL/SQL code like wrapping, obfuscation, and adding license validation.