eBooks-it.org Logo
eBooks-IT.org Inner Image

The Database Hacker's Handbook

Defending Database Servers

The Database Hacker's Handbook Image

Book Details:

Publisher:Wiley
Series: Wiley , Handbook
Author:David Litchfield
Edition:1
ISBN-10:0764578014
ISBN-13:9780764578014
Pages:532
Published:Jul 14 2005
Posted:Nov 19 2014
Language:English
Book format:CHM
Book size:1.13 MB

Book Description:

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access* Recognize vulnerabilities peculiar to each database* Find out what the attackers already knowGo to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.

Download Link:

Related Books:

Gray Hat Hacking

The Ethical Hacker's Handbook
Gray Hat Hacking Image
2nd Edition
A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in. --Bruce Potter, Founder, The Shmoo GroupVery highly recommended whether you are a seasoned professional or just starting out in the security business. --Simple Nomad, Hacker...

The Mac Hacker's Handbook

The Mac Hacker's Handbook Image
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating systemand how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those weaknesses....

The Browser Hacker's Handbook

The Browser Hacker's Handbook Image
Hackers exploit browser vulnerabilities to attack deep within networksThe Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening tec...



2007 - 2021 © eBooks-IT.org