Cargando…

SQL Injection Attacks : Protect Your System from Vulnerabilities /

This video takes you through everything you need to understand SQL injection and how to prepare for attacks as well as how to prevent them. It covers vulnerable website links, basic injection attacks, database and table name discovery, and data extraction. It's everything an ethical hacker need...

Descripción completa

Detalles Bibliográficos
Autor principal: Gupta, Sunil
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Apress, 2020.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1232115141
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cn|||||||||
007 vz czazuu
008 160920s2020 xx --- o vleng d
040 |a NZCPL  |b eng  |c NZCPL  |d OCLCO  |d OCLCF  |d DST  |d OCLCO  |d OCLCQ 
020 |z 9781484265055 
024 8 |a 9781484265055 
029 1 |a AU@  |b 000068846142 
035 |a (OCoLC)1232115141 
036 |b CCLOReilly 
049 |a UAMI 
100 1 |a Gupta, Sunil, 
245 1 0 |a SQL Injection Attacks :  |b Protect Your System from Vulnerabilities /  |c Gupta, Sunil. 
250 |a 1st edition. 
264 1 |b Apress,  |c 2020. 
300 |a 1 online resource (1 streaming video file, approximately 1 hr., 0 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
500 |a Not recommended for use on the libraries' public computers. 
520 |a This video takes you through everything you need to understand SQL injection and how to prepare for attacks as well as how to prevent them. It covers vulnerable website links, basic injection attacks, database and table name discovery, and data extraction. It's everything an ethical hacker needs to know about a SQL injection attack. Web penetration/hacking is a critical issue affecting organizations of all sizes and a SQL injection attack is widely used to perform this attack. SQL injection is a serious web security risk for many organizations used to gather sensitive information from websites. Attackers can easily compromise vulnerable systems. SQL injection is the number one risk in the market. It's easily discoverable to hackers and the impact of this type of attack is severe. It deserves the number one spot. What You Will Learn Use the Sqlsus tool--an open source MySQL injection and takeover tool Analyze time-based SQL injection attacks Understand different SQL injection types Review error-based SQL injection attacks Apply various methods to retrieve table names, column names, and data Who This Video Is For Network security experts, web security specialists, application security experts, penetration testers, and ethical hackers. 
550 |a Made available through: Safari, an O'Reilly Media Company. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781484265055/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP