The Database Hacker's Handbook: Defending Database Servers

The Database Hacker's Handbook: Defending Database Servers

作者: David Litchfield
出版社: Wiley
出版在: 2005-07-01
ISBN-13: 9780764578014
ISBN-10: 0764578014
裝訂格式: Paperback
總頁數: 528 頁





內容描述


Description:

The book will cover the how to break into and how
to defend the most popular database server software. These include:
Oracle
Microsoft's SQL Server IBM's DB2 Postgres
Sybase
MySQLEach of these will be examined to show how hackers
gain access using various methods from buffer overflow exploitation, privilege
escalation through SQL, SQL injection and stored procedure and trigger abuse.
Also discussed are those techniques that are specific to each database. With
each attack topic presented, ways of preventing such abuse will be discussed.

 
Table of Contents:
About
the Authors.
Preface.
Acknowledgments.
Introduction.
Part I: Introduction.
Chapter 1: Why Care About Database Security?

Part II: Oracle.
Chapter 2: The Oracle Architecture.
Chapter 3: Attacking Oracle.
Chapter 4: Oracle: Moving Further into the
Network.
Chapter 5: Securing Oracle.
Part III: DB2.
Chapter 6: IBM DB2 Universal Database.
Chapter 7: DB2: Discovery, Attack, and Defense.

Chapter 8: Attacking DB2.
Chapter 9: Securing DB2.
Part IV: Informix.
Chapter 10: The Informix Architecture.
Chapter 11: Informix: Discovery, Attack, and
Defense.
Chapter 12: Securing Informix.
Part V: Sybase ASE.
Chapter 13: Sybase Architecture.
Chapter 14: Sybase: Discovery, Attack, and
Defense.
Chapter 15: Sybase: Moving Further into the
Network.
Chapter 16: Securing Sybase.
Part VI: MySQL.
Chapter 17: MySQL Architecture.
Chapter 18: MySQL: Discovery, Attack, and
Defense.
Chapter 19: MySQL: Moving Further into the
Network.
Chapter 20: Securing MySQL.
Part VII: SQL Server.
Chapter 21: Microsoft SQL Server Architecture.

Chapter 22: SQL Server: Exploitation, Attack, and
Defense.
Chapter 23: Securing SQL Server.
Part VIII: PostgreSQL.

Chapter 24: The PostgreSQL Architecture.
Chapter 25: PostgreSQL: Discovery and Attack.

Chapter 26: Securing PostgreSQL.
Appendix A: Example C Code for a Time-Delay SQL
Injection Harness.
Appendix B: Dangerous Extended Stored Procedures.

Appendix C: Oracle Default Usernames and
Passwords.
Index.




相關書籍

網絡安全測試實驗室搭建指南 (The Network Security Test Lab: A Step-by-Step Guide)

作者 邁克爾·格雷格 (Michael Gregg)

2005-07-01

Implosion: Lessons from National Security, High Reliability Spacecraft, Electronics, and the Forces Which Changed Them (Paperback)

作者 L. Parker Temple

2005-07-01

黑客攻防從入門到精通(應用大全篇)(升級版)

作者 明月工作室 趙玉萍

2005-07-01