Cargando…

Mastering Database Reconnaissance and Skill Exploitation /

The internet is mostly web applications and most web applications are connected to a database. These databases store everything from usernames and passwords to credit card numbers, social security numbers, and tons of other sensitive or useful information. In many cases, the ability to compromise a...

Descripción completa

Detalles Bibliográficos
Autor principal: Simmons, Skylar (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: EC-Council, 2020.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1260248164
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cnu||||||||
007 vz czazuu
008 010721s2020 xx --- o vleng d
040 |a AU@  |b eng  |c AU@  |d NZCPL  |d OCLCF  |d OCLCO  |d OCLCQ 
019 |a 1277197927  |a 1305888553 
020 |z 400720ACRV 
024 8 |a 400720ACRV 
029 0 |a AU@  |b 000069471299 
035 |a (OCoLC)1260248164  |z (OCoLC)1277197927  |z (OCoLC)1305888553 
049 |a UAMI 
100 1 |a Simmons, Skylar,  |e author. 
245 1 0 |a Mastering Database Reconnaissance and Skill Exploitation /  |c Simmons, Skylar. 
250 |a 1st edition. 
264 1 |b EC-Council,  |c 2020. 
300 |a 1 online resource (1 video file, approximately 4 hr., 25 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
520 |a The internet is mostly web applications and most web applications are connected to a database. These databases store everything from usernames and passwords to credit card numbers, social security numbers, and tons of other sensitive or useful information. In many cases, the ability to compromise a database will soon lead to a much greater system or organization compromise. This class is going to cover the basics of how databases work, identifying databases, hacking SQL database, and more modern NoSQL databases. We are going to cover what to do once you hack a database. Additionally, we will be discussing ways to protect your own applications from these attacks as we progress through the course. 
542 |f Copyright © EC-Council  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title screen (viewed October 31, 2020) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/videos/~/400720ACRV/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP