Path: Top / Member / creativepio@gmail.com
SQL Injection Attacks and Defense
Oleh : Justin Clarke
Dibuat : 2012-03-09, dengan 1 file
Keyword : Injection Attacks
A lot of time has passed since May 2009 when the first edition of this book finally hit the shelves and here we are some three years later with a second edition. When we discussed the idea for the first edition, SQL injection had already been around for over a decade and was definitely nothing new, yet even in 2008 (some 10 years after its discovery and when the first edition began to take shape) people still didnât possess a comprehensive understanding of what SQL injection is, how to discover SQL injection vulnerabilities and/or to exploit them; let alone how to defend against their exploitation nor how to avoid their presence in the first place. Also prevalent was the view that SQL injection was only relevant to Web applications, and that this wasnât a risk factor for hybrid attacks or usable as a method of penetrating an organi-zationâs external security controls â a fact amply proven false by some of the hacking incidents that occurred at about the time of the release of the first edition (Heartland Payment Systems for example).
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | |
Organisasi | |
Nama Kontak | |
Alamat | |
Kota | |
Daerah | |
Negara | |
Telepon | |
Fax | |
E-mail Administrator | |
E-mail CKO |
Print ...
Kontributor...
- , Editor: creativepio@gmail.com@#publisher#
Download...
Download hanya untuk member.
File : 2012 SQL Injection Attacks and Defense.pdf
(15935798 bytes)