Database Hacker's Handbook Defending Database Servers
List price: $50.00
30 day, 100% satisfaction guarantee
If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.
Learn more about our returns policy
Description: The book will cover the how to break into and how to defend the most popular database server software. These include: * Oracle * Microsoft's SQL Server * IBM's DB2 * Postgres * Sybase * MySQL Each of these will be examined to show how hackers gain access using various methods from buffer overflow exploitation, privilege escalation through SQL, SQL injection and stored procedure and trigger abuse. Also discussed are those techniques that are specific to each database. With each attack topic presented, ways of preventing such abuse will be discussed.
Rush Rewards U
You have reached 400 XP and carrot coins. That is the daily max!
Limited time offer:
Get the first one free!
All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.
List price: $50.00
Copyright year: 2005
Publisher: John Wiley & Sons, Incorporated
Publication date: 7/14/2005
Size: 7.25" wide x 9.25" long x 1.25" tall
|About the Authors|
|Why Care About Database Security?|
|The Oracle Architecture|
|Oracle: Moving Further into the Network|
|IBM DB2 Universal Database|
|DB2: Discovery, Attack, and Defense|
|The Informix Architecture|
|Informix: Discovery, Attack, and Defense|
|Sybase: Discovery, Attack, and Defense|
|Sybase: Moving Further into the Network|
|MySQL: Discovery, Attack, and Defense|
|MySQL: Moving Further into the Network|
|Microsoft SQL Server Architecture|
|SQL Server: Exploitation, Attack, and Defense|
|Securing SQL Server|
|The PostgreSQL Architecture|
|PostgreSQL: Discovery and Attack|
|Example C Code for a Time-Delay SQL Injection Harness|
|Dangerous Extended Stored Procedures|