SQL injection attacks and defense /:
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage."--Richard Bejtlich, Tao Security blog SQL injection represents one of th...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, Mass. :
Elsevier,
2012.
|
Ausgabe: | 2nd ed. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage."--Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Attacks an. |
Beschreibung: | 1 online resource (xxviii, 547 pages) : illustrations cm |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781597499736 1597499730 1280878827 9781280878824 9786613720139 6613720135 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn808347500 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 120518s2012 maua ob 001 0 eng d | ||
010 | |z 2012013929 | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCO |d N$T |d YDXCP |d EBLCP |d DEBSZ |d OCLCQ |d COO |d OCLCQ |d D6H |d ICA |d AGLDB |d K6U |d PIFAG |d FVL |d ZCU |d MERUC |d OCLCQ |d U3W |d OCLCA |d OCLCF |d STF |d WRM |d OCLCQ |d VTS |d ICG |d INT |d OCLCQ |d A6Q |d DKC |d OCLCQ |d UKAHL |d C6I |d AU@ |d M8D |d ERF |d UKCRE |d VLB |d VT2 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 804664735 |a 974767555 |a 974855916 |a 980941523 |a 981868677 |a 995774495 |a 1005640406 |a 1017996257 |a 1029498432 |a 1042322899 |a 1049671942 |a 1053511180 |a 1058512179 |a 1083602811 |a 1097162838 |a 1112572678 |a 1153538163 |a 1162301483 |a 1202557397 |a 1240518447 |a 1241894331 |a 1295607006 |a 1300593404 | ||
020 | |a 9781597499736 |q (electronic bk.) | ||
020 | |a 1597499730 |q (electronic bk.) | ||
020 | |z 9781597499637 | ||
020 | |a 1280878827 | ||
020 | |a 9781280878824 | ||
020 | |a 9786613720139 | ||
020 | |a 6613720135 | ||
035 | |a (OCoLC)808347500 |z (OCoLC)804664735 |z (OCoLC)974767555 |z (OCoLC)974855916 |z (OCoLC)980941523 |z (OCoLC)981868677 |z (OCoLC)995774495 |z (OCoLC)1005640406 |z (OCoLC)1017996257 |z (OCoLC)1029498432 |z (OCoLC)1042322899 |z (OCoLC)1049671942 |z (OCoLC)1053511180 |z (OCoLC)1058512179 |z (OCoLC)1083602811 |z (OCoLC)1097162838 |z (OCoLC)1112572678 |z (OCoLC)1153538163 |z (OCoLC)1162301483 |z (OCoLC)1202557397 |z (OCoLC)1240518447 |z (OCoLC)1241894331 |z (OCoLC)1295607006 |z (OCoLC)1300593404 | ||
050 | 4 | |a QA76.9.A25 |b C542 2012eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Clarke, Justin. | |
245 | 1 | 0 | |a SQL injection attacks and defense / |c Justin Clarke. |
246 | 3 | |a SQL injection attacks and defense : elements of financial risk management | |
250 | |a 2nd ed. | ||
260 | |a Waltham, Mass. : |b Elsevier, |c 2012. | ||
300 | |a 1 online resource (xxviii, 547 pages) : |b illustrations cm | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks. | |
520 | |a SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage."--Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Attacks an. | ||
546 | |a English. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Application software |x Security measures. | |
650 | 0 | |a SQL (Computer program language) |0 http://id.loc.gov/authorities/subjects/sh86006628 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Logiciels d'application |x Sécurité |x Mesures. | |
650 | 6 | |a SQL (Langage de programmation) | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a SQL (Computer program language) |2 fast | |
758 | |i has work: |a SQL injection attacks and defense (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG8THpjKdRVq87KkHpHhRC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Clarke, Justin. |t SQL Injection Attacks and Defense. |d Burlington : Elsevier Science, ©2012 |z 9781597499637 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=490339 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=490339 |3 Volltext | |
938 | |a Askews and Holts Library Services |b ASKH |n AH24095093 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL953188 | ||
938 | |a ebrary |b EBRY |n ebr10578541 | ||
938 | |a EBSCOhost |b EBSC |n 490339 | ||
938 | |a YBP Library Services |b YANK |n 9315897 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn808347500 |
---|---|
_version_ | 1813903584478101504 |
adam_text | |
any_adam_object | |
author | Clarke, Justin |
author_facet | Clarke, Justin |
author_role | |
author_sort | Clarke, Justin |
author_variant | j c jc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 C542 2012eb |
callnumber-search | QA76.9.A25 C542 2012eb |
callnumber-sort | QA 276.9 A25 C542 42012EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks. |
ctrlnum | (OCoLC)808347500 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04766cam a2200745Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn808347500</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">120518s2012 maua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2012013929</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">ICA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">K6U</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">C6I</subfield><subfield code="d">AU@</subfield><subfield code="d">M8D</subfield><subfield code="d">ERF</subfield><subfield code="d">UKCRE</subfield><subfield code="d">VLB</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">804664735</subfield><subfield code="a">974767555</subfield><subfield code="a">974855916</subfield><subfield code="a">980941523</subfield><subfield code="a">981868677</subfield><subfield code="a">995774495</subfield><subfield code="a">1005640406</subfield><subfield code="a">1017996257</subfield><subfield code="a">1029498432</subfield><subfield code="a">1042322899</subfield><subfield code="a">1049671942</subfield><subfield code="a">1053511180</subfield><subfield code="a">1058512179</subfield><subfield code="a">1083602811</subfield><subfield code="a">1097162838</subfield><subfield code="a">1112572678</subfield><subfield code="a">1153538163</subfield><subfield code="a">1162301483</subfield><subfield code="a">1202557397</subfield><subfield code="a">1240518447</subfield><subfield code="a">1241894331</subfield><subfield code="a">1295607006</subfield><subfield code="a">1300593404</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499736</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499730</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597499637</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280878827</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280878824</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613720139</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613720135</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)808347500</subfield><subfield code="z">(OCoLC)804664735</subfield><subfield code="z">(OCoLC)974767555</subfield><subfield code="z">(OCoLC)974855916</subfield><subfield code="z">(OCoLC)980941523</subfield><subfield code="z">(OCoLC)981868677</subfield><subfield code="z">(OCoLC)995774495</subfield><subfield code="z">(OCoLC)1005640406</subfield><subfield code="z">(OCoLC)1017996257</subfield><subfield code="z">(OCoLC)1029498432</subfield><subfield code="z">(OCoLC)1042322899</subfield><subfield code="z">(OCoLC)1049671942</subfield><subfield code="z">(OCoLC)1053511180</subfield><subfield code="z">(OCoLC)1058512179</subfield><subfield code="z">(OCoLC)1083602811</subfield><subfield code="z">(OCoLC)1097162838</subfield><subfield code="z">(OCoLC)1112572678</subfield><subfield code="z">(OCoLC)1153538163</subfield><subfield code="z">(OCoLC)1162301483</subfield><subfield code="z">(OCoLC)1202557397</subfield><subfield code="z">(OCoLC)1240518447</subfield><subfield code="z">(OCoLC)1241894331</subfield><subfield code="z">(OCoLC)1295607006</subfield><subfield code="z">(OCoLC)1300593404</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">C542 2012eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Clarke, Justin.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SQL injection attacks and defense /</subfield><subfield code="c">Justin Clarke.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">SQL injection attacks and defense : elements of financial risk management</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Waltham, Mass. :</subfield><subfield code="b">Elsevier,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxviii, 547 pages) :</subfield><subfield code="b">illustrations cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage."--Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Attacks an.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">SQL (Computer program language)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh86006628</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels d'application</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">SQL (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SQL (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">SQL injection attacks and defense (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG8THpjKdRVq87KkHpHhRC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Clarke, Justin.</subfield><subfield code="t">SQL Injection Attacks and Defense.</subfield><subfield code="d">Burlington : Elsevier Science, ©2012</subfield><subfield code="z">9781597499637</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=490339</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=490339</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH24095093</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL953188</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10578541</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">490339</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">9315897</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn808347500 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:21:00Z |
institution | BVB |
isbn | 9781597499736 1597499730 1280878827 9781280878824 9786613720139 6613720135 |
language | English |
oclc_num | 808347500 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xxviii, 547 pages) : illustrations cm |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Elsevier, |
record_format | marc |
spelling | Clarke, Justin. SQL injection attacks and defense / Justin Clarke. SQL injection attacks and defense : elements of financial risk management 2nd ed. Waltham, Mass. : Elsevier, 2012. 1 online resource (xxviii, 547 pages) : illustrations cm text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Includes bibliographical references and index. What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks. SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage."--Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Attacks an. English. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Application software Security measures. SQL (Computer program language) http://id.loc.gov/authorities/subjects/sh86006628 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Logiciels d'application Sécurité Mesures. SQL (Langage de programmation) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast SQL (Computer program language) fast has work: SQL injection attacks and defense (Text) https://id.oclc.org/worldcat/entity/E39PCG8THpjKdRVq87KkHpHhRC https://id.oclc.org/worldcat/ontology/hasWork Print version: Clarke, Justin. SQL Injection Attacks and Defense. Burlington : Elsevier Science, ©2012 9781597499637 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=490339 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=490339 Volltext |
spellingShingle | Clarke, Justin SQL injection attacks and defense / What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Application software Security measures. SQL (Computer program language) http://id.loc.gov/authorities/subjects/sh86006628 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Logiciels d'application Sécurité Mesures. SQL (Langage de programmation) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast SQL (Computer program language) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh86006628 |
title | SQL injection attacks and defense / |
title_alt | SQL injection attacks and defense : elements of financial risk management |
title_auth | SQL injection attacks and defense / |
title_exact_search | SQL injection attacks and defense / |
title_full | SQL injection attacks and defense / Justin Clarke. |
title_fullStr | SQL injection attacks and defense / Justin Clarke. |
title_full_unstemmed | SQL injection attacks and defense / Justin Clarke. |
title_short | SQL injection attacks and defense / |
title_sort | sql injection attacks and defense |
topic | Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Application software Security measures. SQL (Computer program language) http://id.loc.gov/authorities/subjects/sh86006628 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Logiciels d'application Sécurité Mesures. SQL (Langage de programmation) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast SQL (Computer program language) fast |
topic_facet | Computer security. Computer networks Security measures. Application software Security measures. SQL (Computer program language) Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Logiciels d'application Sécurité Mesures. SQL (Langage de programmation) COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=490339 |
work_keys_str_mv | AT clarkejustin sqlinjectionattacksanddefense AT clarkejustin sqlinjectionattacksanddefenseelementsoffinancialriskmanagement |