当前位置: 首页 > 资源下载 > 数据库 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

The Database Hacker’s Handbook: Defending Database Servers

The Database Hacker’s Handbook: Defending Database Servers

书名:The Database Hacker’s Handbook: Defending Database Servers

上传:石头

时间:2009-09-02

文件大小:1.12 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:David Litchfield, Chris Anley, John Heasman, Bill Grindlay
出版日期:July 14, 2005
出版社:Wiley Publishing
页数:500
ISBN:ISBN-10: 0764578014 ISBN-13: 978-0764578014
文件格式:CHM

Product Description
Databases are the nerve center of our economy. Every piece of yourpersonal information is stored there-medical records, bank accounts,employment history, pensions, car registrations, even your children’sgrades and what groceries you buy. Database attacks are potentiallycrippling-and relentless.
In this essential follow-up to The Shellcoder’s Handbook, four ofthe world’s top security experts teach you to break into and defend theseven most popular database servers. You’ll learn how to identifyvulnerabilities, how attacks are carried out, and how to stop thecarnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM’s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalationthrough SQL, stored procedure or trigger abuse, and SQL injectionenable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.
From the Back Cover
Databases are the nerve center of our economy. Every piece of yourpersonal information is stored there—medical records, bank accounts,employment history, pensions, car registrations, even your children’sgrades and what groceries you buy. Database attacks are potentiallycrippling—and relentless.
In this essential follow-up to The Shellcoder’s Handbook, four ofthe world’s top security experts teach you to break into and defend theseven most popular database servers. You’ll learn how to identifyvulnerabilities, how attacks are carried out, and how to stop thecarnage. The bad guys already know all this. You need to know it too.
Identify and plug the new holes in Oracle and Microsoft® SQL ServerLearn the best defenses for IBM’s DB2®, PostgreSQL, Sybase ASE, and MySQL® serversDiscover how buffer overflow exploitation, privilege escalationthrough SQL, stored procedure or trigger abuse, and SQL injectionenable hacker accessRecognize vulnerabilities peculiar to each databaseFind out what the attackers already knowGo to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.
Tags:DatabaseDefendingHackerHandbookThe


相关书籍

  • VoIP Handbook: Applications, Technologies, Reliability, and Security
  • Database Porgramming With Jdbc And Java 2nd Edition
  • 《OCA Oracle Database 11g: SQL Fundamentals I Exam Guide (Exam 1Z0-051)》
  • VoIP Handbook: Applications, Technologies, Reliability, and Security
  • VoIP Handbook: Applications, Technologies, Reliability, and Security

评论 (0) All

登陆 | 还没注册?