Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Database Hacker's Handbook: Defending Database Servers

Buy
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.

  • Identify and plug the new holes in Oracle and Microsoft® SQL Server
  • Learn the best defenses for IBM's DB2®, PostgreSQL, Sybase ASE, and MySQL® servers
  • Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
  • Recognize vulnerabilities peculiar to each database
  • Find out what the attackers already know

Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.

About the Author
David Litchfield specializes in searching for new threats to database systems and web applications and holds the unofficial world record for finding major security flaws. He has lectured to both British and U.S. government security agencies on database security and is a regular speaker at the Blackhat Security Briefings. He is a co-author of The Shellcoder’s Handbook, SQL Server Security, and Special Ops. In his spare time he is the Managing Director of Next Generation Security Software Ltd.

Chris Anley is a co-author of The Shellcoder’s Handbook, a best-selling book about security vulnerability research. He has published whitepapers and security advisories on a number of database systems, including SQL Server, Sybase, MySQL, DB2, and Oracle.

John Heasman is a principal security consultant at NGS Software. He is a prolific security researcher and has published many security advisories relating to high-profile products such as Microsoft Windows, Real Player, Apple Quick-Time, and PostgreSQL.

Bill Grindlay is a senior security consultant and software engineer at NGS Software. He has worked on both the generalized vulnerability scanner Typhon III and the NGSSQuirreL family of database security scanners. He is a co-author of the database administrator’s guide, SQL Server Security.

Next Generation Security Software Ltd is a UK-based company that develops a suite of database server vulnerability assessment tools, the NGSSQuirreL family. Founded in 2001, NGS Software’s consulting arm is the largest dedicated security team in Europe. All four authors of this book work for NGS Software.

(HTML tags aren't allowed.)

Adobe Encore DVD 2.0 Classroom in a Book
Adobe Encore DVD 2.0 Classroom in a Book
The most comprehensive way to learn Adobe Encore DVD 2.0! Classroom in a Book, the best-selling series of hands-on software training workbooks, helps you learn the features of Adobe software quickly and easily. Classroom in a Book offers what no other book or training program does--an official training series from Adobe Systems Incorporated,...
Wind Issues in the Design of Buildings
Wind Issues in the Design of Buildings

Wind Issues in the Design of Buildings explains the ways that structural designers accommodate the impact of extreme wind events on the built environment. By studying the flow and pressure fields around buildings, architects and engineers can identify and select the best strategies for ensuring that a building will resist the loads due to...

The Complete FreeBSD, Fourth Edition
The Complete FreeBSD, Fourth Edition

FreeBSD is by far the most popular version of BSDВ®, the legendary operating system that has contributed a great deal to every version of UnixВ® in use today (including Mac OSВ® X). Originally a community effort by the University of California at Berkeley, FreeBSD was aimed at making Unix a little friendlier and easier to...


Essential Windows Phone 7.5: Application Development with Silverlight (Microsoft Windows Development Series)
Essential Windows Phone 7.5: Application Development with Silverlight (Microsoft Windows Development Series)
I have never owned a PalmPilot. But I have owned palmtops and smartphones. I dived into writing software for a plethora of different devices but never got very far. My problem was that the story of getting software onto the phones was chaotic and I didn’t see how the marketing of software for phones would lead to a...
Fusion: An Introduction to the Physics and Technology of Magnetic Confinement Fusion
Fusion: An Introduction to the Physics and Technology of Magnetic Confinement Fusion

This second edition of a popular textbook is thoroughly revised with around 25% new and updated content.
It provides an introduction to both plasma physics and fusion technology at a level that can be understood by advanced undergraduates and graduate students in the physical sciences and related engineering disciplines.
As such,
...

Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)
Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)

The main goal of this graduate-level text is to provide a language for understanding, unifying, and implementing a wide variety of algorithms for digital signal processing -- in particular, to provide rules and procedures that can simplify or even automate the task of writing code for the newest parallel and vector machines. It thus bridges...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy