SQL injection attacks and defense
I tiakina i:
Kaituhi matua: | |
---|---|
Kaituhi rangatōpū: | |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Waltham, Mass. :
Elsevier,
2012.
|
Putanga: | 2nd ed. |
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- What is SQL injection?
- Testing for SQL injection
- Reviewing code for SQL injection
- Exploiting SQL injection
- Blind SQL injection exploitation
- Exploiting the operating system
- Advanced topics
- Code-level defenses
- Platform level defenses
- Confirming and recovering from SQL injection attacks.