Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Database Hacker's Handbook: Defending Database Servers

Buy
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.

  • Identify and plug the new holes in Oracle and Microsoft® SQL Server
  • Learn the best defenses for IBM's DB2®, PostgreSQL, Sybase ASE, and MySQL® servers
  • Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
  • Recognize vulnerabilities peculiar to each database
  • Find out what the attackers already know

Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.

About the Author
David Litchfield specializes in searching for new threats to database systems and web applications and holds the unofficial world record for finding major security flaws. He has lectured to both British and U.S. government security agencies on database security and is a regular speaker at the Blackhat Security Briefings. He is a co-author of The Shellcoder’s Handbook, SQL Server Security, and Special Ops. In his spare time he is the Managing Director of Next Generation Security Software Ltd.

Chris Anley is a co-author of The Shellcoder’s Handbook, a best-selling book about security vulnerability research. He has published whitepapers and security advisories on a number of database systems, including SQL Server, Sybase, MySQL, DB2, and Oracle.

John Heasman is a principal security consultant at NGS Software. He is a prolific security researcher and has published many security advisories relating to high-profile products such as Microsoft Windows, Real Player, Apple Quick-Time, and PostgreSQL.

Bill Grindlay is a senior security consultant and software engineer at NGS Software. He has worked on both the generalized vulnerability scanner Typhon III and the NGSSQuirreL family of database security scanners. He is a co-author of the database administrator’s guide, SQL Server Security.

Next Generation Security Software Ltd is a UK-based company that develops a suite of database server vulnerability assessment tools, the NGSSQuirreL family. Founded in 2001, NGS Software’s consulting arm is the largest dedicated security team in Europe. All four authors of this book work for NGS Software.

(HTML tags aren't allowed.)

The Official Guide to 3D GameStudio
The Official Guide to 3D GameStudio
If you’re a video game enthusiast, then you’ve probably thought more than once about creating your own games. Now you can develop your own 3D games using 3D GameStudio! The Official Guide to 3D GameStudio will help you develop the skills you need to create a variety of games, including first-person shooter and fantasy role-playing....
Nuclear Engineering Handbook (Mechanical Engineering)
Nuclear Engineering Handbook (Mechanical Engineering)

Nuclear power has, in recent years, undergone a major transformation, resulting in major technical developments and a new generation of nuclear scientists and engineers. A comprehensive book that reflects the latest nuclear technologies has been lacking—until now.

The Nuclear Engineering Handbook is a response to...

Imagining the Tenth Dimension: A New Way of Thinking About Time and Space
Imagining the Tenth Dimension: A New Way of Thinking About Time and Space

Reality, today's physicists tell us, is created by the vibrations of exquisitely tiny superstrings in ten spatial dimensions. Ten dimensions? Most of us have barely gotten used to the idea that there are four.

Using simple geometry and an easygoing writing style, author Rob Bryanton starts with the lower dimensions that we are...


Web Document Analysis: Challenges and Opportunities
Web Document Analysis: Challenges and Opportunities
This book provides the first comprehensive look at the emerging field of web document analysis. It sets the scene in this new field by combining state-of-the-art reviews of challenges and opportunities with research papers by leading researchers. Readers will find in-depth discussions on the many diverse and interdisciplinary areas within the...
Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work
Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work

Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work is the first book on the subject for smaller businesses.

Until now, design thinking—a methodology for solving business problems and identifying opportunities—has been the playground for companies with big budgets,
...

Innovative Cryptography (Programming Series)
Innovative Cryptography (Programming Series)
Innovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy