Published ล 2005, 500 pages.
The database hacker's handbook: defending database servers
โ Scribed by Litchfield, David; Anley, Chris; Heasman, John
- Publisher
- Wiley
- Year
- 2005
- Tongue
- English
- Weight
- 319 KB
- Category
- Fiction
- ISBN-13
- 9780764578014
No coin nor oath required. For personal study only.
โฆ Synopsis
Product Description
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.
From the Back Cover
Databases are the nerve center of our economy. Every piece of your personal information is stored thereโmedical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially cripplingโand relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
- Identify and plug the new holes in Oracle and Microsoftยฎ SQL Server
- Learn the best defenses for IBM's DB2ยฎ, PostgreSQL, Sybase ASE, and MySQLยฎ servers
- Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
- Recognize vulnerabilities peculiar to each database
- Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.
๐ SIMILAR VOLUMES
### From the Back Cover **Knowledge is power, and the power can be yours** While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creati
othing stands still. The only constant is change-and key N sales technologies, like database marketing, will have to adapt to the changing market. But where is database marketing going? And how should bankers who sell insurance tailor their database marketing efforts to meet the needs of today's cha