Book Cover
E-book

Title The database hacker's handbook : defending database servers / David Litchfield [and others]
Published Indianapolis, Ind. : Wiley, ©2005

Copies

Description 1 online resource (xxviii, 500 pages)
Contents Why care about database security? -- The Oracle architecture -- Attacking Oracle -- Oracle : moving further into the network -- Securing oracle -- IBM DB2 Universal Database -- DB2 : discovery, attack, and defense -- Attacking DB2 -- Securing DB2 -- The Informix architecture -- Informix : discovery, attack, and defense -- Securing Informix -- Sybase architecture -- Sybase : discovery, attack, and defense -- Sybase : moving further into the network -- Securing Sybase -- MySQL architecture -- MySQL : discovery, attack, and defense -- MySQL : moving further into the network -- Securing MySQL -- Microsoft SQL Server architecture -- SQL Server : exploitation, attack, and defense -- Securing SQL Server -- The PostgreSQL architecture -- PostgreSQL : discovery and attack -- Securing PostgreSQL -- Example C Code for a time-delay SQL injection harness -- Dangerous extended stored procedures -- Oracle default usernames and passwords
Summary Annotation Databases are the nerve center of our economy. Every piece of your personal information is stored there & ndash;medical records, bank accounts, employment history, pensions, car registrations, even your children & prime;s grades and what groceries you buy. Database attacks are potentially crippling & ndash;and relentless.<br /><br />In this essential follow & ndash;up to The Shellcoder & prime;s Handbook, four of the world & prime;s top security experts teach you to break into and defend the seven most popular database servers. You & prime;ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.<br /> & lowast; Identify and plug the new holes in Oracle and Microsoft(r) SQL Server<br /> & lowast; Learn the best defenses for IBM & prime;s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers<br /> & lowast; Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access<br /> & lowast; Recognize vulnerabilities peculiar to each database<br /> & lowast; Find out what the attackers already know<br /><br />Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download
Notes Title from title screen
Bibliography Includes bibliographical references and index
Notes Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Subject Computer networks -- Security measures.
Computer security
Database security.
Computer Security
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer networks -- Security measures
Computer security
Database security
Form Electronic book
Author Litchfield, David, 1975-
ISBN 0764578014
9780764578014
9781461919254
1461919258