pull down to refresh

Written by four of the world's top security experts, this book teaches you how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage of database hackers. Databases are the nerve center of our economy. Every piece of your personal information is stored there -- medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless. Identify and plug the new holes in Oracle and Microsoft SQL Server Learn the best defenses for IBM's DB2, PostgreSQL, Sybase ASE, ald MySQL serversDiscover how buffer overflow exploitation,privilege escalation through SQL, stored procedure or trigger abuse, and SQL injectionenable hacker access Recognize vulnerabilities peculiar to eachdatabase Find out what the attackers already know
this territory is moderated