|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn137284065 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
070531s2007 cau o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d GA0
|d CEF
|d OCLCQ
|d DEBSZ
|d EBLCP
|d MHW
|d N$T
|d OCLCQ
|d TEFOD
|d OCLCQ
|d OCLCF
|d OCLCQ
|d YDXCP
|d FMG
|d E7B
|d TEFOD
|d OCLCQ
|d COO
|d OCLCQ
|d OCLCO
|d BRL
|d WYU
|d UAB
|d AU@
|d VT2
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d KSU
|d OCL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 173611156
|a 856990332
|
020 |
|
|
|a 9780596529642
|q (electronic bk.)
|
020 |
|
|
|a 0596529643
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000062602844
|
029 |
1 |
|
|a CHBIS
|b 006149717
|
029 |
1 |
|
|a CHVBK
|b 171402375
|
029 |
1 |
|
|a DEBSZ
|b 355422492
|
029 |
1 |
|
|a DEBSZ
|b 397008139
|
029 |
1 |
|
|a HEBIS
|b 291494196
|
035 |
|
|
|a (OCoLC)137284065
|z (OCoLC)173611156
|z (OCoLC)856990332
|
037 |
|
|
|a CL0500000010
|b Safari Books Online
|
037 |
|
|
|a A98D6467-1E09-4A1B-99EA-E0B8DDB4F6C5
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.73.S67
|b N97 2007
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.75/85
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Nystrom, Marty.
|
245 |
1 |
0 |
|a SQL injection defenses /
|c by Martin Nystrom.
|
260 |
|
|
|a Sebastopol, Calif. :
|b O'Reilly,
|c 2007.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a O'Reilly shortcuts
|
588 |
|
|
|a Print version record.
|
520 |
|
|
|a This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft.
|
505 |
0 |
|
|a Why Should You Care?; Data at Risk; How Applications Work; How Web Applications Work; How SQL Queries Work; How Web Applications Receive Data; Attacks; Motivations; What Makes Attacks Possible?; How Attacks Work; Types of Attacks; Defenses; Defense #1: Code Securely; Defense #2: Monitor for Attacks; Defense #3: Block Attacks; Defense #4: Probe for Vulnerabilities; Conclusion and Bottom Line.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a SQL server.
|
630 |
0 |
7 |
|a SQL server.
|2 blmlsh
|
630 |
0 |
7 |
|a SQL server
|2 fast
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Data transmission systems.
|
650 |
|
0 |
|a Client/server computing.
|
650 |
|
0 |
|a Database security.
|
650 |
|
6 |
|a Bases de données
|x Gestion.
|
650 |
|
6 |
|a Données
|x Transmission.
|
650 |
|
6 |
|a Architecture client-serveur (Informatique)
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a Database management.
|2 blmlsh
|
650 |
|
7 |
|a Data transmission systems.
|2 blmlsh
|
650 |
|
7 |
|a Client/server computing.
|2 blmlsh
|
650 |
|
7 |
|a Database security
|2 fast
|
650 |
|
7 |
|a Client/server computing
|2 fast
|
650 |
|
7 |
|a Data transmission systems
|2 fast
|
650 |
|
7 |
|a Database management
|2 fast
|
830 |
|
0 |
|a O'Reilly shortcuts.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780596529642/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3118092
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL711299
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10762178
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 477815
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9339439
|
994 |
|
|
|a 92
|b IZTAP
|