feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV043439740
    Format: 679 Seiten : , Illustrationen, Diagramme.
    ISBN: 3-645-60466-9 , 978-3-645-60466-6
    Uniform Title: SQL injections attacks and defense
    Note: Auf dem Cover: Nutzbar für alle SQL-Datenbanken. Spezialwissen zu Oracle, MS SQL Server, MySQL und PostgreSQL.
    Additional Edition: Erscheint auch als Online-Ausgabe, EPUB ISBN 978-3-645-22372-0
    Additional Edition: Erscheint auch als Online-Ausgabe, PDF ISBN 978-3-645-20466-8
    Language: German
    Subjects: Computer Science
    RVK:
    RVK:
    RVK:
    Keywords: SQL ; Datensicherung
    Author information: Clarke, Justin.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV043439740
    Format: 679 Seiten , Illustrationen, Diagramme
    ISBN: 3645604669 , 9783645604666
    Uniform Title: SQL injections attacks and defense
    Note: Auf dem Cover: Nutzbar für alle SQL-Datenbanken. Spezialwissen zu Oracle, MS SQL Server, MySQL und PostgreSQL.
    Additional Edition: Erscheint auch als Online-Ausgabe, EPUB ISBN 978-3-645-22372-0
    Additional Edition: Erscheint auch als Online-Ausgabe, PDF ISBN 978-3-645-20466-8
    Language: German
    Subjects: Computer Science
    RVK:
    RVK:
    RVK:
    Keywords: SQL ; Datensicherung
    Author information: Clarke, Justin
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV019838293
    Format: XIII, 324 S. , Ill., graph. Darst.
    Edition: 1. ed.
    ISBN: 0596007949
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Rechnernetz ; Datensicherung ; Computersicherheit ; Computersicherheit ; Datensicherung ; Open Source ; Programmierung
    Author information: Clarke, Justin
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Burlington, MA :Syngress Pub.,
    UID:
    almahu_9949697642802882
    Format: 1 online resource (494 p.)
    ISBN: 1-282-16959-9 , 9786612169595 , 0-08-095857-5
    Content: SQL injection is a technique that exploits security vulnerabilities in a web site by inserting malicious code into the database that runs it. Such attacks can be used to deface or disable public websites, spread viruses and other malware, or steal sensitive information such as credit card numbers, Social Security Numbers, or passwords. Along with cross-site scripting, SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT s
    Note: Includes index. , Front Cover; SQL Injectgion Attacks and Defense; Copyright Page; Lead Author and Techinical Editior; Contributing Authors; Contents; Chapter 1: What Is SQL Injection?; Introduction; Understanding How Web Applications Work; A Simple Application Architecture; A More Complex Architecture; Understanding SQL Injection; High-Profile Examples; Understanding How It Happens; Dynamic String Building; Incorrectly Handled Escape Characters; Incorrectly Handled Types; Incorrectly Handled Query Assembly; Incorrectly Handled Errors; Incorrectly Handled Multiple Submissions; Insecure Database Configuration , SummarySolutions Fast Track; Frequently Asked Questions; Chapter 2: Testing forSQL Injection; Introduction; Finding SQL Injection; Testing by Inference; Identifying Data Entry; GET Requests; POST Requests; Other Injectable Data; Manipulating Parameters; Information Workflow; Database Errors; Commonly Displayed SQL Errors; Microsoft SQL Server Errors; MySQL Errors; Oracle Errors; Application Response; Generic Errors; HTTP Code Errors; Different Response Sizes; Blind Injection Detection; Confirming SQL Injection; Differentiating Numbers and Strings; Inline SQL Injection , Injecting Strings InlineInjecting Numeric Values Inline; Terminating SQL Injection; Database Comment Syntax; Using Comments; Executing Multiple Statements; Time Delays; Automating SQL Injection Discovery; Tools for Automatically Finding SQL Injection; HP WebInspect; IBM Rational AppScan; HP Scrawlr; SQLiX; Paros Proxy; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Reviewing Codefor SQL Injection; Introduction; Reviewing Source Code for SQL Injection; Dangerous Coding Behaviors; Dangerous Functions; Following the Data; Following Data in PHP; Following Data in Java , Following Data in C#Reviewing PL/SQL and T-SQL Code; Automated Source Code Review; Yet Another Source Code Analyzer (YASCA); Pixy; AppCodeScan; Lapse; Security Compass Web Application Analysis Tool (SWAAT); Microsoft Source Code Analyzer for SQL Injection; Microsoft Code Analysis Tool .NET (CAT.NET); Commercial Source Code Review Tools; Ounce; Fortify Source Code Analyzer; CodeSecure; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: ExploitingSQL Injection; Introduction; Understanding Common Exploit Techniques; Using Stacked Queries; Identifying the Database , Non-Blind FingerprintBanner Grabbing; Blind Fingerprint; Extracting Data through UNION Statements; Matching Columns; Matching Data Types; Using Conditional Statements; Approach 1: Time-based; Approach 2: Error-based; Approach 3: Content-based; Working with Strings; Extending the Attack; Using Errors for SQL Injection; Error Messages in Oracle; Enumerating the Database Schema; SQL Server; MySQL; Oracle; Escalating Privileges; SQL Server; Privilege Escalation on Unpatched Servers; Oracle; Stealing the Password Hashes; SQL Server; MySQL; Oracle; Oracle Components; APEX; Oracle Internet Directory , Out-of-Band Communication , English
    Additional Edition: ISBN 1-59749-424-0
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Waltham, Mass. :Elsevier,
    UID:
    almahu_9947368424602882
    Format: 1 online resource (576 p.)
    Edition: 2nd ed.
    ISBN: 1-280-87882-7 , 9786613720139 , 1-59749-973-0
    Content: SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award ""SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage."" -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers
    Note: Description based upon print version of record. , What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks. , English
    Additional Edition: ISBN 1-59749-963-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    AV-Medium
    AV-Medium
    [Berlin] : Caroline international
    UID:
    kobvindex_ZLB34144153
    Format: 1 CD , 1 Blatt , 12 cm
    Note: Caution. Pick up the phone. Halloween. London. Purple sky. Hand on the bible. Preach. Spiritual warfare. Houdini. Next of kin. No love. King. Slumdog millionaire. Shellington crescent. Jess song. Window pain. Black rose.
    Language: English
    Keywords: England ; Hip-Hop ; Musiktonträger
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book
    Book
    Waltham, MA : Syngress
    UID:
    b3kat_BV040408500
    Format: XXVIII, 547 S. , Ill., graph. Darst. , 24 cm
    Edition: 2. ed.
    ISBN: 9781597499637 , 1597499633
    Note: Includes index , What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks , Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: SQL ; Datenbanksystem ; Computersicherheit
    Author information: Clarke, Justin
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Amsterdam [u.a.] :Elsevier, Syngress,
    UID:
    almahu_BV042249426
    Format: 1 Online-Ressource (576 S.) : , Ill., graph. Darst.
    Edition: 2. ed.
    ISBN: 978-1-59749-963-7 , 978-1-59749-973-6
    Note: Includes index. - What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks. - Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: SQL ; Datenbanksystem ; Computersicherheit
    Author information: Clarke, Justin.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    AV-Medium
    AV-Medium
    [Berlin] : GIIG
    UID:
    kobvindex_ZLB34218110
    Format: 2 Schallplatten , 2 farbige, bedruckte Innenhüllen , 30 cm
    Note: Caution. Pick up the phone. Halloween. London. Purple sky. Hand on the bible. Preach. Spiritual warfare. Houdini. Next of kin. No love. King. Slumdog millionaire. Shellington crescent. Jess song. Window pain. Black rose.
    Language: English
    Keywords: Rap ; Musiktonträger
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Waltham, Mass. :Elsevier,
    UID:
    almahu_9948315830402882
    Format: xxviii, 547 p. : , ill. cm.
    Edition: 2nd ed.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Note: What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages