عرض عادي
SQL injection attacks and defense / Justin Clarke.
نوع المادة : نصالناشر:Waltham, MA : Elsevier, [2012]تاريخ حقوق النشر: copyright 2012وصف:xvviii, 547 pages : illustrations ; 24 cmنوع المحتوى:- text
- unmediated
- volume
- 9781597499637
- QA76.9.A25 C542 2012
المحتويات:
What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 C542 2012 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011138951 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 C542 2012 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010011138950 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
QA76.9.A25 C377 2019 Transformational security awareness: what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors / | QA76.9.A25 C377 2019 Transformational security awareness: what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors / | QA76.9.A25 C542 2012 SQL injection attacks and defense / | QA76.9.A25 C542 2012 SQL injection attacks and defense / | QA76.9.A25 C59 1995 Protection and security on the information superhighway | QA76.9.A25 C59 2013 Advanced persistent threat : understanding the danger and how to protect your organization / | QA76.9.A25 C59 2013 Advanced persistent threat : understanding the danger and how to protect your organization / |
Includes bibliographical references and index.
What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.