SQL injection attacks and defense
Material type: TextPublication details: Waltham, MA : Elsevier, c2012.Description: xvviii, 547 p. : ill. ; 24 cmISBN:- 9781597499637
- 005.8 23 CLA-S
- QA76.9.A25 C542 2012
Contents:
What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
Books | IIITD Reference | Computer Science and Engineering | REF 005.8 CLA-S (Browse shelf(Opens below)) | Available | 003944 |
Total holds: 0
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
REF 005.8 BUC-I Introduction to security and network forensics | REF 005.8 CHA-F Fingerprints and other ridge skin impressions | REF 005.8 CHE-S Secure programming with static analysis | REF 005.8 CLA-S SQL injection attacks and defense | REF 005.8 COW-C Computer forensics : | REF 005.8 COW-F Friction ridge skin : | REF 005.8 COX-D Digital watermarking and steganography |
Includes bibliographical references and index.
What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.
There are no comments on this title.