Description |
1 online resource (xxviii, 500 pages) |
Contents |
Why care about database security? -- The Oracle architecture -- Attacking Oracle -- Oracle : moving further into the network -- Securing oracle -- IBM DB2 Universal Database -- DB2 : discovery, attack, and defense -- Attacking DB2 -- Securing DB2 -- The Informix architecture -- Informix : discovery, attack, and defense -- Securing Informix -- Sybase architecture -- Sybase : discovery, attack, and defense -- Sybase : moving further into the network -- Securing Sybase -- MySQL architecture -- MySQL : discovery, attack, and defense -- MySQL : moving further into the network -- Securing MySQL -- Microsoft SQL Server architecture -- SQL Server : exploitation, attack, and defense -- Securing SQL Server -- The PostgreSQL architecture -- PostgreSQL : discovery and attack -- Securing PostgreSQL -- Example C Code for a time-delay SQL injection harness -- Dangerous extended stored procedures -- Oracle default usernames and passwords |
Summary |
Annotation Databases are the nerve center of our economy. Every piece of your personal information is stored there & ndash;medical records, bank accounts, employment history, pensions, car registrations, even your children & prime;s grades and what groceries you buy. Database attacks are potentially crippling & ndash;and relentless.<br /><br />In this essential follow & ndash;up to The Shellcoder & prime;s Handbook, four of the world & prime;s top security experts teach you to break into and defend the seven most popular database servers. You & prime;ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.<br /> & lowast; Identify and plug the new holes in Oracle and Microsoft(r) SQL Server<br /> & lowast; Learn the best defenses for IBM & prime;s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers<br /> & lowast; Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access<br /> & lowast; Recognize vulnerabilities peculiar to each database<br /> & lowast; Find out what the attackers already know<br /><br />Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download |
Notes |
Title from title screen |
Bibliography |
Includes bibliographical references and index |
Notes |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
|
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL |
Subject |
Computer networks -- Security measures.
|
|
Computer security
|
|
Database security.
|
|
Computer Security
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Database security
|
Form |
Electronic book
|
Author |
Litchfield, David, 1975-
|
ISBN |
0764578014 |
|
9780764578014 |
|
9781461919254 |
|
1461919258 |
|