SQL injection attacks and defense
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9781597499637
- 005.8 23 CLA-S
- QA76.9.A25 C542 2012
Contents:
What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
IIITD Reference | Computer Science and Engineering | REF 005.8 CLA-S (Browse shelf(Opens below)) | Available | 003944 |
Total holds: 0
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
REF 005.8 BUC-I Introduction to security and network forensics | REF 005.8 CHA-F Fingerprints and other ridge skin impressions | REF 005.8 CHE-S Secure programming with static analysis | REF 005.8 CLA-S SQL injection attacks and defense | REF 005.8 COW-C Computer forensics : | REF 005.8 COW-F Friction ridge skin : | REF 005.8 COX-D Digital watermarking and steganography |
Includes bibliographical references and index.
What is SQL injection? -- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.
There are no comments on this title.