Cargando…

SQL injection defenses /

This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages....

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Nystrom, Marty
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, Calif. : O'Reilly, 2007.
Colección:O'Reilly shortcuts.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Why Should You Care?; Data at Risk; How Applications Work; How Web Applications Work; How SQL Queries Work; How Web Applications Receive Data; Attacks; Motivations; What Makes Attacks Possible?; How Attacks Work; Types of Attacks; Defenses; Defense #1: Code Securely; Defense #2: Monitor for Attacks; Defense #3: Block Attacks; Defense #4: Probe for Vulnerabilities; Conclusion and Bottom Line.