Cargando…

SQL injection attacks and defense /

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Clarke, Justin
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub., ©2009.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn460107845
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 091027s2009 maua ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d B24X7  |d OCLCQ  |d OCLCF  |d UMI  |d EBLCP  |d IDEBK  |d CEF  |d N$T  |d E7B  |d MHW  |d DEBSZ  |d TEFOD  |d VLB  |d YDXCP  |d TEFOD  |d OCLCQ  |d COO  |d LIV  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCA  |d NLE  |d D6H  |d OCLCQ  |d LEAUB  |d OL$  |d OCLCQ  |d BRF  |d WYU  |d UKAHL  |d VT2  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBA939786  |2 bnb 
016 7 |a 015117290  |2 Uk 
019 |a 560270436  |a 647821712  |a 690601884  |a 712984986  |a 742294525  |a 815782030  |a 823121064  |a 823842442  |a 823910246  |a 824098753  |a 824153935  |a 1058939342  |a 1064071695  |a 1097165599  |a 1235833943  |a 1240536067 
020 |a 9781597494243 
020 |a 1597494240 
020 |a 9780080958576  |q (electronic bk.) 
020 |a 0080958575  |q (electronic bk.) 
020 |a 1282169599 
020 |a 9781282169593 
029 1 |a AU@  |b 000046313104 
029 1 |a AU@  |b 000048799039 
029 1 |a AU@  |b 000053259513 
029 1 |a CHBIS  |b 006041513 
029 1 |a CHNEW  |b 001009314 
029 1 |a CHVBK  |b 199630895 
029 1 |a DEBBG  |b BV042305279 
029 1 |a DEBSZ  |b 355444003 
029 1 |a DEBSZ  |b 372882684 
029 1 |a DEBSZ  |b 40532569X 
029 1 |a DEBSZ  |b 430758502 
029 1 |a DKDLA  |b 820120-katalog:9910110660205765 
029 1 |a HEBIS  |b 29151426X 
029 1 |a NZ1  |b 15189173 
035 |a (OCoLC)460107845  |z (OCoLC)560270436  |z (OCoLC)647821712  |z (OCoLC)690601884  |z (OCoLC)712984986  |z (OCoLC)742294525  |z (OCoLC)815782030  |z (OCoLC)823121064  |z (OCoLC)823842442  |z (OCoLC)823910246  |z (OCoLC)824098753  |z (OCoLC)824153935  |z (OCoLC)1058939342  |z (OCoLC)1064071695  |z (OCoLC)1097165599  |z (OCoLC)1235833943  |z (OCoLC)1240536067 
037 |a 176536:172962  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
037 |a 88C32FC1-2281-4E1B-9078-917D937AFFE4  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b C53 2009 
072 7 |a K  |2 bicssc 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Clarke, Justin. 
245 1 0 |a SQL injection attacks and defense /  |c Justin Clarke, lead author and technical editor ; [contributing authors], Rodrigo Marcos Alvarez [and others]. 
260 |a Burlington, MA :  |b Syngress Pub.,  |c ©2009. 
300 |a 1 online resource (xix, 473 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts. What is SQL injection?-Understand what it is and how it works Find, confirm, and automate SQL injection discovery Discover tips and tricks for finding SQL injection within the code Create exploits using SQL injection Design to avoid the dangers of these attacks. 
505 0 |a Chapter 1: What is SQL Injection? -- Chapter 2: Testing for SQL Injection -- Chapter 3: Reviewing Code for SQL Injection -- Chapter 4: Exploiting SQL Injection -- Chapter 5: Blind SQL Injection Exploitation -- Chapter 6: Exploiting the Operating System -- Chapter 7: Advanced Topics -- Chapter 8: Code-Level Defenses -- Chapter 9: Platform-Level Defenses -- Chapter 10: References. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a SQL (Computer program language) 
650 6 |a Sécurité informatique. 
650 6 |a SQL (Langage de programmation) 
650 7 |a Computer security  |2 fast 
650 7 |a SQL (Computer program language)  |2 fast 
776 0 8 |i Print version:  |a Clarke, Justin.  |t SQL injection attacks and defense.  |d Burlington, MA : Syngress Pub., ©2009  |z 9781597494243  |z 1597494240  |w (OCoLC)276822457 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780080958576/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH23092357 
938 |a Books 24x7  |b B247  |n bks00032207 
938 |a EBL - Ebook Library  |b EBLB  |n EBL452968 
938 |a ebrary  |b EBRY  |n ebr10310739 
938 |a EBSCOhost  |b EBSC  |n 297249 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 216959 
938 |a YBP Library Services  |b YANK  |n 3057038 
994 |a 92  |b IZTAP