作者:David Litchfield, Chris Anley, John Heasman, Bill Grindlay
出版日期:July 14, 2005
出版社:Wiley Publishing
页数:500
ISBN:ISBN-10: 0764578014 ISBN-13: 978-0764578014
文件格式:CHM
Product Description
Databases are the nerve center of our economy. Every piece of yourpersonal information is stored there-medical records, bank accounts,employment history, pensions, car registrations, even your children’sgrades and what groceries you buy. Database attacks are potentiallycrippling-and relentless.
In this essential follow-up to The Shellcoder’s Handbook, four ofthe world’s top security experts teach you to break into and defend theseven most popular database servers. You’ll learn how to identifyvulnerabilities, how attacks are carried out, and how to stop thecarnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM’s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalationthrough SQL, stored procedure or trigger abuse, and SQL injectionenable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.
From the Back Cover
Databases are the nerve center of our economy. Every piece of yourpersonal information is stored there—medical records, bank accounts,employment history, pensions, car registrations, even your children’sgrades and what groceries you buy. Database attacks are potentiallycrippling—and relentless.
In this essential follow-up to The Shellcoder’s Handbook, four ofthe world’s top security experts teach you to break into and defend theseven most popular database servers. You’ll learn how to identifyvulnerabilities, how attacks are carried out, and how to stop thecarnage. The bad guys already know all this. You need to know it too.
Identify and plug the new holes in Oracle and Microsoft® SQL ServerLearn the best defenses for IBM’s DB2®, PostgreSQL, Sybase ASE, and MySQL® serversDiscover how buffer overflow exploitation, privilege escalationthrough SQL, stored procedure or trigger abuse, and SQL injectionenable hacker accessRecognize vulnerabilities peculiar to each databaseFind out what the attackers already knowGo to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.