SQL injection defenses /
This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages....
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Sebastopol, Calif. :
O'Reilly,
2007.
|
Series: | O'Reilly shortcuts.
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Why Should You Care?; Data at Risk; How Applications Work; How Web Applications Work; How SQL Queries Work; How Web Applications Receive Data; Attacks; Motivations; What Makes Attacks Possible?; How Attacks Work; Types of Attacks; Defenses; Defense #1: Code Securely; Defense #2: Monitor for Attacks; Defense #3: Block Attacks; Defense #4: Probe for Vulnerabilities; Conclusion and Bottom Line.