The Database Hacker's Handbook : Defending Database Servers
来源:互联网 发布:淘宝如何拍下商品 编辑:程序博客网 时间:2024/05/01 11:00
The Database Hacker's Handbook : Defending Database Servers
Authors : David Litchfield, Chris Anley, John Heasman, Bill Grindlay
| Publisher: Wiley (July 14, 2005) | ISBN: 0764578014 | 500 pages | CHM | Rar size : 1.11 MB |
Authors : David Litchfield, Chris Anley, John Heasman, Bill Grindlay
| Publisher: Wiley (July 14, 2005) | ISBN: 0764578014 | 500 pages | CHM | Rar size : 1.11 MB |
Book Description :
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
- Identify and plug the new holes in Oracle and Microsoft® SQL Server
- Learn the best defenses for IBM's DB2®, PostgreSQL, Sybase ASE, and MySQL® servers
- Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
- Recognize vulnerabilities peculiar to each database
- Find out what the attackers already know
Table Of Contents :
Part I, Introduction
Chapter 1, Why Care About Database Security?
Part II, Oracle
Chapter 2, The Oracle Architecture
Chapter 3, Attacking Oracle
Chapter 4, Oracle: Moving Further into the Network
Chapter 5, Securing Oracle
Part III, DB2
Chapter 6, IBM DB2 Universal Database
Chapter 7, DB2: Discovery, Attack, and Defense
Chapter 8, Attacking DB2
Chapter 9, Securing DB2
Part IV, Informix
Chapter 10, The Informix Architecture
Chapter 11, Informix: Discovery, Attack, and Defense
Chapter 12, Securing Informix
Part V, Sybase ASE
Chapter 13, The Sybase Architecture
Chapter 14, Sybase: Discovery, Attack, and Defense
Chapter 15, Sybase: Moving Further into the Network
Chapter 16, Securing Sybase
Part VI, MySQL
Chapter 17, MySQL Architecture
Chapter 18, MySQL: Discovery, Attack, and Defense
Chapter 19, MySQL: Moving Further into the Network
Chapter 20, Securing MySQL
Part VII, SQL Server
Chapter 21, Microsoft SQL Server Architecture
Chapter 22, SQL Server: Exploitation, Attack, and Defense
Chapter 23, Securing SQL Server
Part VIII, PostgreSQL
Chapter 24, The PostgreSQL Architecture
Chapter 25, PostgreSQL: Discovery and Attack
Chapter 26, Securing PostgreSQL
Appendix A, Example C Code for a Time-Delay SQL Injection Harness
Appendix B, Dangerous Extended Stored Procedures
Appendix C, Oracle Default Usernames and Passwords
Amazon Info
Click Here for code samples, security alerts , and programs available for download.
Rapid Download
non Rapid Download
Password : Password
- The Database Hacker's Handbook : Defending Database Servers
- The Database Hacker's Handbook: Defending Database Servers
- The Database Hacker's Handbook: Defending Database Servers
- The Oracle Hacker's Handbook: Hacking and Defending Oracle
- The Oracle Hacker's Handbook: Hacking and Defending Oracle
- The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
- The Web Application Hacker's Handbook
- The Web Application Hacker's Handbook
- The Web Application Hacker's Handbook
- The Antivirus Hacker's Handbook 读书笔记
- Android hacker's handbook 读书笔记
- Hacking Database Servers
- Advanced SQL Database Programmer Handbook
- The Web Application Hacker's Handbook: Discovering and Exploiting, Security Flaws (Paperback) Oct.2007.eBook-BBL
- The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd
- 136.You have two database servers SEMP and SACCT. The database in the SEMP server maintains the empl
- To estimate the database's effective!
- 当innerHTML遇到flash壳
- 开闭原则(Open-Closed Principle)与Strategy模式
- 2006-9-1 中学网站首页色彩搭配
- readFile
- Csdn Blog模板CSS代码(6):笔记簿
- The Database Hacker's Handbook : Defending Database Servers
- ant和junit集成处理一个代理的例子
- 2006-9-1 关于中学网站的主题
- Security Software MegaPost (Firewalls and Anti-Viruses)
- SQL写物料需求
- TVU Player 2.2.0
- Subduing CLASSPATH
- Babylon Pro v6.0.0 (r32)
- 又加班到9点 kao