๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Cover of The database hacker's handbook: defending database servers

The database hacker's handbook: defending database servers

โœ Scribed by Litchfield, David; Anley, Chris; Heasman, John


Publisher
Wiley
Year
2005
Tongue
English
Weight
319 KB
Category
Fiction
ISBN-13
9780764578014

No coin nor oath required. For personal study only.

โœฆ Synopsis


Product Description

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.

In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know

Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.

From the Back Cover

Databases are the nerve center of our economy. Every piece of your personal information is stored thereโ€”medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially cripplingโ€”and relentless.

In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.

  • Identify and plug the new holes in Oracle and Microsoftยฎ SQL Server
  • Learn the best defenses for IBM's DB2ยฎ, PostgreSQL, Sybase ASE, and MySQLยฎ servers
  • Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
  • Recognize vulnerabilities peculiar to each database
  • Find out what the attackers already know

Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.


๐Ÿ“œ SIMILAR VOLUMES


Defending the database
โœ Ulf Mattsson ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 106 KB
The Oracle Hacker's Handbook Hacking and
โœ Litchfield, David ๐Ÿ“‚ Fiction ๐Ÿ“… 2007 ๐Ÿ› Wiley ๐ŸŒ English โš– 4 MB

### From the Back Cover **Knowledge is power, and the power can be yours** While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creati

The Database Designer's Workbench
โœ Richard E. Cobb; James P. Fry; Toby J. Teorey ๐Ÿ“‚ Article ๐Ÿ“… 1984 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 812 KB
Database marketing: What's the future?
๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 301 KB ๐Ÿ‘ 1 views

othing stands still. The only constant is change-and key N sales technologies, like database marketing, will have to adapt to the changing market. But where is database marketing going? And how should bankers who sell insurance tailor their database marketing efforts to meet the needs of today's cha