找回密码
 注册
搜索
热搜: java php web
查看: 652|回复: 3

The Database Hacker’s Handbook: Defending Database Servers

[复制链接]
发表于 2009-9-2 17:02:09 | 显示全部楼层 |阅读模式


作者:David Litchfield, Chris Anley, John Heasman, Bill Grindlay
出版日期:July 14, 2005
出版社:Wiley Publishing
页数:500
ISBN:ISBN-10: 0764578014 ISBN-13: 978-0764578014
文件格式:CHM

Product Description
Databases are the nerve center of our economy. Every piece of yourpersonal information is stored there-medical records, bank accounts,employment history, pensions, car registrations, even your children’sgrades and what groceries you buy. Database attacks are potentiallycrippling-and relentless.
In this essential follow-up to The Shellcoder’s Handbook, four ofthe world’s top security experts teach you to break into and defend theseven most popular database servers. You’ll learn how to identifyvulnerabilities, how attacks are carried out, and how to stop thecarnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM’s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalationthrough SQL, stored procedure or trigger abuse, and SQL injectionenable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.
From the Back Cover
Databases are the nerve center of our economy. Every piece of yourpersonal information is stored there—medical records, bank accounts,employment history, pensions, car registrations, even your children’sgrades and what groceries you buy. Database attacks are potentiallycrippling—and relentless.
In this essential follow-up to The Shellcoder’s Handbook, four ofthe world’s top security experts teach you to break into and defend theseven most popular database servers. You’ll learn how to identifyvulnerabilities, how attacks are carried out, and how to stop thecarnage. The bad guys already know all this. You need to know it too.
  • Identify and plug the new holes in Oracle and Microsoft® SQL Server
  • Learn the best defenses for IBM’s DB2®, PostgreSQL, Sybase ASE, and MySQL® servers
  • Discover how buffer overflow exploitation, privilege escalationthrough SQL, stored procedure or trigger abuse, and SQL injectionenable hacker access
  • Recognize vulnerabilities peculiar to each database
  • Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
发表于 2010-4-13 08:01:00 | 显示全部楼层
回复

使用道具 举报

发表于 2010-5-13 02:51:50 | 显示全部楼层
jhjhjhjhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|软晨网(RuanChen.com)

GMT+8, 2024-9-20 13:42

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表