博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
The Database Hacker's Handbook: Defending Database Servers
阅读量:4230 次
发布时间:2019-05-26

本文共 1156 字,大约阅读时间需要 3 分钟。

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 - topmvp

Databases are the nerve center of our economy. Every piece of your personal information is stored there -- medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.

In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.

*Identify and plug the new holes in Oracle and Microsoft SQL Server
*Learn the best defenses for IBM's DB2, PostgreSQL, Sybase ASE, and MySQL servers
*Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
*Recognize vulnerabilities peculiar to each database
*Find out what the attackers already know
http://rapidshare.com/files/51094864/0764578014.rar
你可能感兴趣的文章
通过eclipse查看、阅读hadoop2.4源码
查看>>
离线安装Cloudera Manager5.3.4与CDH5.3.4
查看>>
关于一些弹出对话框的提示
查看>>
文件下载问题
查看>>
ASP.NET返回上一页的方法小集
查看>>
超链接,根据条件使得超链接显示与否
查看>>
RegisterClientScriptBlock 与 RegisterStartupScript的使用与区别
查看>>
SQLServer中Partition By 函数的使用
查看>>
vscode-Live Server的使用心得
查看>>
Error: listen EACCES 0.0.0.0:8080
查看>>
键盘键值表
查看>>
神经网络中 BP 算法的原理与 Python 实现源码解析
查看>>
Quagga使用笔记2
查看>>
几种最短路径算法的思考
查看>>
图解Bellman-ford算法
查看>>
面试注意
查看>>
运算符重载
查看>>
三种内存问题与三种指针
查看>>
JFinal在网络服务端开发中的位置
查看>>
JFinal中的ActiveRecord
查看>>