SQL injection attacks and defense / by Justin Clarke.
Material type: TextBurlington : Syngress, 2009Description: xix; 473 pages : illustrations ; 24 cmISBN:- 978-1597494243 :
- QA76.9.A25 C542 2012
Contents:
What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.
Item type | Current library | Home library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Books | Chinhoyi University of Technology Libraries | Chinhoyi University of Technology Libraries | QA 76.9.A25 CLA (Browse shelf(Opens below)) | c.036029 | Available | BK00458679 | |
Books | Chinhoyi University of Technology Libraries | Chinhoyi University of Technology Libraries | QA 76.9.A25 CLA (Browse shelf(Opens below)) | c.036049 | Available | BK00462272 | |
Books | Chinhoyi University of Technology Libraries | Chinhoyi University of Technology Libraries | QA 76.9.A25 CLA (Browse shelf(Opens below)) | c.045772 | Available | BK00459468 | |
Books | Chinhoyi University of Technology Libraries | Chinhoyi University of Technology Libraries | QA 76.9.A25 CLA (Browse shelf(Opens below)) | c.045773 | Available | BK00459455 |
Browsing Chinhoyi University of Technology Libraries shelves Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
QA 76.9.A25 CAL IT governance : a manager's guide to data security and ISO 27001/ISO 27002 / | QA 76.9.A25 CLA SQL injection attacks and defense / | QA 76.9.A25 CLA SQL injection attacks and defense / | QA 76.9.A25 CLA SQL injection attacks and defense / | QA 76.9.A25 CLA SQL injection attacks and defense / | QA 76.9A25 CLA SQL injection attacks and defense / | QA 76.9.A25 COM Computer and information security handbook |
Includes bibliographical references and index.
What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.
There are no comments on this title.