Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

Available items only
Record 5 of 44
Previous Record Next Record

Title The database hacker's handbook : defending database servers / David Litchfield [and others].

Imprint Indianapolis, Ind. : Wiley, ©2005.


Location Call No. OPAC Message Status
 Axe Books 24x7 IT E-Book  Electronic Book    ---  Available
Description 1 online resource (xxviii, 500 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note Title from title screen.
Bibliography Includes bibliographical references and index.
Contents Why care about database security? -- The Oracle architecture -- Attacking Oracle -- Oracle : moving further into the network -- Securing oracle -- IBM DB2 Universal Database -- DB2 : discovery, attack, and defense -- Attacking DB2 -- Securing DB2 -- The Informix architecture -- Informix : discovery, attack, and defense -- Securing Informix -- Sybase architecture -- Sybase : discovery, attack, and defense -- Sybase : moving further into the network -- Securing Sybase -- MySQL architecture -- MySQL : discovery, attack, and defense -- MySQL : moving further into the network -- Securing MySQL -- Microsoft SQL Server architecture -- SQL Server : exploitation, attack, and defense -- Securing SQL Server -- The PostgreSQL architecture -- PostgreSQL : discovery and attack -- Securing PostgreSQL -- Example C Code for a time-delay SQL injection harness -- Dangerous extended stored procedures -- Oracle default usernames and passwords.
Summary Annotation Databases are the nerve center of our economy. Every piece of your personal information is stored there & ndash;medical records, bank accounts, employment history, pensions, car registrations, even your children & prime;s grades and what groceries you buy. Database attacks are potentially crippling & ndash;and relentless.<br /><br />In this essential follow & ndash;up to The Shellcoder & prime;s Handbook, four of the world & prime;s top security experts teach you to break into and defend the seven most popular database servers. You & prime;ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.<br /> & lowast; Identify and plug the new holes in Oracle and Microsoft(r) SQL Server<br /> & lowast; Learn the best defenses for IBM & prime;s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers<br /> & lowast; Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access<br /> & lowast; Recognize vulnerabilities peculiar to each database<br /> & lowast; Find out what the attackers already know<br /><br />Go to for code samples, security alerts, and programs available for download.
System Details Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. MiAaHDL
Processing Action digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Subject Computer networks -- Security measures.
Computer security.
Database security.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Systèmes informatiques -- Sécurité -- Mesures.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer networks -- Security measures. (OCoLC)fst00872341
Computer security. (OCoLC)fst00872484
Database security. (OCoLC)fst00888063
Genre/Form Electronic books.
Added Author Litchfield, David, 1975- Author.
Other Form: Print version: Database hacker's handbook. Indianapolis, Ind. : Wiley, ©2005 (DLC) 2005008241 (OCoLC)58789031
ISBN 0764578014 (paper/website)
9780764578014 (paper/website)
9781461919254 (electronic bk.)
1461919258 (electronic bk.)
Standard No. 9780764578014
AU@ 000053224948
DEBBG BV040901048
DEBSZ 378282328
DEBSZ 381370798
GBVCP 785438009
UNITY 075496704

Available items only