Ethical hacking: SQL injections
SQL injections are a powerful, but complex attack that can be used to strike out at web applications and their databases. This course explores how an SQL attack could alter, steal, or remove data without necessarily hacking" a target.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2016
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | SQL injections are a powerful, but complex attack that can be used to strike out at web applications and their databases. This course explores how an SQL attack could alter, steal, or remove data without necessarily hacking" a target. |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781509005314 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477369 | ||
003 | DE-604 | ||
005 | 20220216 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781509005314 |9 978-1-5090-0531-4 | ||
035 | |a (ZDB-37-ICG)EDP467 | ||
035 | |a (OCoLC)1269390113 | ||
035 | |a (DE-599)BVBBV047477369 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Oriyano, Sean |e Verfasser |4 aut | |
245 | 1 | 0 | |a Ethical hacking |b SQL injections |c Sean Oriyano |
264 | 1 | |a United States |b IEEE |c 2016 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) | ||
520 | |a SQL injections are a powerful, but complex attack that can be used to strike out at web applications and their databases. This course explores how an SQL attack could alter, steal, or remove data without necessarily hacking" a target. | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Internet | |
650 | 4 | |a Security | |
650 | 4 | |a Authentication | |
650 | 4 | |a Ethics | |
650 | 4 | |a Web services | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878930 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP467 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP467 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793444392960 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Oriyano, Sean |
author_facet | Oriyano, Sean |
author_role | aut |
author_sort | Oriyano, Sean |
author_variant | s o so |
building | Verbundindex |
bvnumber | BV047477369 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP467 (OCoLC)1269390113 (DE-599)BVBBV047477369 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01659nmm a2200421zc 4500</leader><controlfield tag="001">BV047477369</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220216 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509005314</subfield><subfield code="9">978-1-5090-0531-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269390113</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477369</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="b">SQL injections</subfield><subfield code="c">Sean Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">SQL injections are a powerful, but complex attack that can be used to strike out at web applications and their databases. This course explores how an SQL attack could alter, steal, or remove data without necessarily hacking" a target.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878930</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP467</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP467</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477369 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:12Z |
institution | BVB |
isbn | 9781509005314 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878930 |
oclc_num | 1269390113 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IEEE |
record_format | marc |
spelling | Oriyano, Sean Verfasser aut Ethical hacking SQL injections Sean Oriyano United States IEEE 2016 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) SQL injections are a powerful, but complex attack that can be used to strike out at web applications and their databases. This course explores how an SQL attack could alter, steal, or remove data without necessarily hacking" a target. Computer security Internet Security Authentication Ethics Web services (DE-588)4017102-4 Film gnd-content |
spellingShingle | Oriyano, Sean Ethical hacking SQL injections Computer security Internet Security Authentication Ethics Web services |
subject_GND | (DE-588)4017102-4 |
title | Ethical hacking SQL injections |
title_auth | Ethical hacking SQL injections |
title_exact_search | Ethical hacking SQL injections |
title_exact_search_txtP | Ethical hacking SQL injections |
title_full | Ethical hacking SQL injections Sean Oriyano |
title_fullStr | Ethical hacking SQL injections Sean Oriyano |
title_full_unstemmed | Ethical hacking SQL injections Sean Oriyano |
title_short | Ethical hacking |
title_sort | ethical hacking sql injections |
title_sub | SQL injections |
topic | Computer security Internet Security Authentication Ethics Web services |
topic_facet | Computer security Internet Security Authentication Ethics Web services Film |
work_keys_str_mv | AT oriyanosean ethicalhackingsqlinjections |