The database hacker's handbook : defending database servers /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Wiley,
©2005.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Why care about database security?
- The Oracle architecture
- Attacking Oracle
- Oracle : moving further into the network
- Securing oracle
- IBM DB2 Universal Database
- DB2 : discovery, attack, and defense
- Attacking DB2
- Securing DB2
- The Informix architecture
- Informix : discovery, attack, and defense
- Securing Informix
- Sybase architecture
- Sybase : discovery, attack, and defense
- Sybase : moving further into the network
- Securing Sybase
- MySQL architecture
- MySQL : discovery, attack, and defense
- MySQL : moving further into the network
- Securing MySQL
- Microsoft SQL Server architecture
- SQL Server : exploitation, attack, and defense
- Securing SQL Server
- The PostgreSQL architecture
- PostgreSQL : discovery and attack
- Securing PostgreSQL
- Example C Code for a time-delay SQL injection harness
- Dangerous extended stored procedures
- Oracle default usernames and passwords.