Database Hacker's Handbook Defending Database Servers

ISBN-10: 0764578014
ISBN-13: 9780764578014
Edition: 2005
List price: $50.00
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: The book will cover the how to break into and how to defend the most popular database server software. These include: * Oracle * Microsoft's SQL Server * IBM's DB2 * Postgres * Sybase * MySQL Each of these will be examined to show how  More...

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Psychology Online content $4.95 $1.99
Add to cart
Study Briefs
Lifespan Human Development Online content $4.95 $1.99
Add to cart
Study Briefs
Careers in Engineering Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $50.00
Copyright year: 2005
Publisher: John Wiley & Sons, Incorporated
Publication date: 7/14/2005
Binding: Paperback
Pages: 532
Size: 7.25" wide x 9.25" long x 1.25" tall
Weight: 1.056
Language: English

The book will cover the how to break into and how to defend the most popular database server software. These include: * Oracle * Microsoft's SQL Server * IBM's DB2 * Postgres * Sybase * MySQL Each of these will be examined to show how hackers gain access using various methods from buffer overflow exploitation, privilege escalation through SQL, SQL injection and stored procedure and trigger abuse. Also discussed are those techniques that are specific to each database. With each attack topic presented, ways of preventing such abuse will be discussed.

About the Authors
Preface
Acknowledgments
Introduction
Introduction
Why Care About Database Security?
Oracle
The Oracle Architecture
Attacking Oracle
Oracle: Moving Further into the Network
Securing Oracle
DB
IBM DB2 Universal Database
DB2: Discovery, Attack, and Defense
Attacking DB
Securing DB
Informix
The Informix Architecture
Informix: Discovery, Attack, and Defense
Securing Informix
Sybase ASE
Sybase Architecture
Sybase: Discovery, Attack, and Defense
Sybase: Moving Further into the Network
Securing Sybase
MySQL
MySQL Architecture
MySQL: Discovery, Attack, and Defense
MySQL: Moving Further into the Network
Securing MySQL
SQL Server
Microsoft SQL Server Architecture
SQL Server: Exploitation, Attack, and Defense
Securing SQL Server
PostgreSQL
The PostgreSQL Architecture
PostgreSQL: Discovery and Attack
Securing PostgreSQL
Example C Code for a Time-Delay SQL Injection Harness
Dangerous Extended Stored Procedures
Appendix C
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×