Bilginin Adresi Homepage
Forum Home Forum Home > Yaşama Dair > Elektronik Kitap & E-Book
  New Posts New Posts
  FAQ FAQ  Forum Search   Register Register  Login Login

REKLAM ALANI

El dokuma Konya Kilim, Kayseri Kilim, Antik Milas Halı, Antik Yörük Kilim, Hint Kilim

Konya Kilimleri Kayseri Kimleri Yörük İran ve Antika Kilimler Hint Kilimleri

Yeni ve 2. El İnşaat Yapı Malzemeleri

Masa iskele, Beton Paspayı, Kalıpaltı iskele, Güvenlikli iskele

Fayer İnşaat Ergenekon İnşaat


The Database Hacker's Handbook: Defending Database Servers

 Post Reply Post Reply
Author
Message
invertor View Drop Down
Security Professional
Security Professional
Avatar
İnventor

Joined: 18-01-2008
Status: Offline
Points: 3332
Post Options Post Options   Thanks (0) Thanks(0)   Quote invertor Quote  Post ReplyReply Direct Link To This Post Topic: The Database Hacker's Handbook: Defending Database Servers
    Posted: 26-03-2009 at 00:50
 
David Litchfield, Chris Anley, John Heasman , Bill Grindlay, "The Database Hacker's Handbook: Defending Database Servers"
Wiley | 2005 | ISBN: 0764578014 | 500 pages | CHM | 1,1 MB

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
 
Download
 
 
mirror



 
Back to Top
 Post Reply Post Reply
  Share Topic   

Forum Jump Forum Permissions View Drop Down



This page was generated in 0.063 seconds.