Personnaliser

OK

Database Hacker's Handbook w/WS - Bill Grindlay

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre
Filtrer par :

31,08 €

Occasion · Bon État

  • Ou 7,77 € /mois

    • Livraison GRATUITE
    • Livré entre le 26 et le 29 mai
    Voir les modes de livraison

    momox

    PRO Vendeur favori

    4,8/5 sur + de 1 000 ventes

    Livré gratuitement chez vous en 2 semaines. L'article présente des traces d'utilisation, mais est en bon état. 2 millions de ventes réalisées en 5 ans, merci de votre confiance ! Découvrez les avis (https://fr.shopping.rakuten.com/feedback/momox) de...

    Nos autres offres

    • 48,80 €

      Produit Neuf

      Ou 12,20 € /mois

      • Livraison à 0,01 €
      Voir les modes de livraison
      4,7/5 sur + de 1 000 ventes

      Nouvel article expédié dans le 24H à partir des Etats Unis Livraison au bout de 20 à 30 jours ouvrables.

      Voir le détail de l'annonce 
    • 54,88 €

      Produit Neuf

      Ou 13,72 € /mois

      • Livraison à 0,01 €
      Voir les modes de livraison
      4,8/5 sur + de 1 000 ventes

      Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.

      Voir le détail de l'annonce 
    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Database Hacker's Handbook W / Ws de Bill Grindlay Format Broché  - Livre Anglais

        Note : 0 0 avis sur Database Hacker's Handbook W / Ws de Bill Grindlay Format Broché  - Livre Anglais

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Database Hacker's Handbook W / Ws de Bill Grindlay Format Broché

         - Livre Anglais

        Livre Anglais - Bill Grindlay - 01/07/2005 - Broché - Langue : Anglais

        . .

      • Auteur(s) : Bill Grindlay - Chris Anley - David Litchfield - John Heasman
      • Editeur : John Wiley & Sons
      • Langue : Anglais
      • Parution : 01/07/2005
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 528.0
      • ISBN : 9780764578014



      • Résumé :
        About the Authors.

        Preface.

        Acknowledgments.

        Introduction.

        Part I: Introduction.

        Chapter 1: Why Care About Database Security?

        Part II: Oracle.

        Chapter 2: The Oracle Architecture.

        Chapter 3: Attacking Oracle.

        Chapter 4: Oracle: Moving Further into the Network.

        Chapter 5: Securing Oracle.

        Part III: DB2.

        Chapter 6: IBM DB2 Universal Database.

        Chapter 7: DB2: Discovery, Attack, and Defense.

        Chapter 8: Attacking DB2.

        Chapter 9: Securing DB2.

        Part IV: Informix.

        Chapter 10: The Informix Architecture.

        Chapter 11: Informix: Discovery, Attack, and Defense.

        Chapter 12: Securing Informix.

        Part V: Sybase ASE.

        Chapter 13: Sybase Architecture.

        Chapter 14: Sybase: Discovery, Attack, and Defense.

        Chapter 15: Sybase: Moving Further into the Network.

        Chapter 16: Securing Sybase.

        Part VI: MySQL.

        Chapter 17: MySQL Architecture.

        Chapter 18: MySQL: Discovery, Attack, and Defense.

        Chapter 19: MySQL: Moving Further into the Network.

        Chapter 20: Securing MySQL.

        Part VII: SQL Server.

        Chapter 21: Microsoft SQL Server Architecture.

        Chapter 22: SQL Server: Exploitation, Attack, and Defense.

        Chapter 23: Securing SQL Server.

        Part VIII: PostgreSQL.

        Chapter 24: The PostgreSQL Architecture.

        Chapter 25: PostgreSQL: Discovery and Attack.

        Chapter 26: Securing PostgreSQL.

        Appendix A: Example C Code for a Time-Delay SQL Injection Harness.

        Appendix B: Dangerous Extended Stored Procedures.

        Appendix C: Oracle Default Usernames and Passwords.

        Index.

        ...

        Biographie:
        David Litchfield specializes in searching for new threats to database systems and web applications and holds the unofficial world record for finding major security flaws. He has lectured to both British and U.S. government security agencies on database security and is a regular speaker at the Blackhat Security Briefings. He is a co-author of The Shellcoder's Handbook, SQL Server Security, and Special Ops. In his spare time he is the Managing Director of Next Generation Security Software Ltd.

        Chris Anley is a co-author of The Shellcoder's Handbook, a best-selling book about security vulnerability research. He has published whitepapers and security advisories on a number of database systems, including SQL Server, Sybase, MySQL, DB2, and Oracle.

        John Heasman is a principal security consultant at NGS Software. He is a prolific security researcher and has published many security advisories relating to high-profile products such as Microsoft Windows, Real Player, Apple Quick-Time, and PostgreSQL.

        Bill Grindlay is a senior security consultant and software engineer at NGS Software. He has worked on both the generalized vulnerability scanner Typhon III and the NGSSQuirreL family of database security scanners. He is a co-author of the database administrator's guide, SQL Server Security.

        Next Generation Security Software Ltd is a UK-based company that develops a suite of database server vulnerability assessment tools, the NGSSQuirreL family. Founded in 2001, NGS Software's consulting arm is the largest dedicated security team in Europe. All four authors of this book work for NGS Software.

        ...

        Sommaire:
        Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.

        In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
        * Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
        * Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
        * Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
        * Recognize vulnerabilities peculiar to each database
        * Find out what the attackers already know

        Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download....

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com