《SQL Injection Attacks and Defense》电子书下载

SQL Injection Attacks and Defensetxt,chm,pdf,epub,mobi下载
作者: Clarke, Justin
出版社: Elsevier
副标题: 2nd Edition
出版年: 2012-6-18
页数: 576
定价: $ 67.74
ISBN: 9781597499637

内容简介  · · · · · ·

"SQL Injection Attacks and Defense, First Edition": Winner of the Best Book Bejtlich Read Award. "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage". (Richard Bejtlich, Tao Security blog). SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the I...




作者简介  · · · · · ·

Justin Clarke (CISSP, CISM, CISA, MCSE, CEH) is a cofounder and executive director of Gotham Digital Science, based in the United Kingdom. He has over ten years of experience in testing the security of networks, web applications, and wireless networks for large financial, retail, and technology clients in the United States, the United Kingdom and New Zealand.




目录  · · · · · ·

Acknowledgements
Dedication
Contributing Authors
Lead Author and Technical
Introduction to the 2nd Edition
Chapter 1. What Is SQL Injection?
· · · · · · ()
Acknowledgements
Dedication
Contributing Authors
Lead Author and Technical
Introduction to the 2nd Edition
Chapter 1. What Is SQL Injection?
Introduction
Understanding How Web Applications Work
Understanding SQL Injection
Understanding How It Happens
Summary
Solutions Fast Track
Chapter 2. Testing for SQL Injection
Introduction
Finding SQL Injection
Confirming SQL Injection
Automating SQL Injection Discovery
Summary
Solutions Fast Track
Chapter 3. Reviewing Code for SQL Injection
Introduction
Reviewing source code for SQL injection
Automated source code review
Summary
Solutions fast track
Chapter 4. Exploiting SQL injection
Introduction
Understanding common exploit techniques
Identifying the database
Extracting data through UNION statements
Using conditional statements
Enumerating the database schema
Injecting into “INSERT” queries
Escalating privileges
Stealing the password hashes
Out-of-band communication
SQL injection on mobile devices
Automating SQL injection exploitation
Summary
Solutions Fast Track
Chapter 5. Blind SQL Injection Exploitation
Introduction
Finding and confirming blind SQL injection
Using time-based techniques
Using Response-Based Techniques
Using Alternative Channels
Automating blind SQL injection exploitation
Summary
Solutions fast track
Chapter 6. Exploiting the operating system
Introduction
Accessing the file system
Executing operating system commands
Consolidating access
Summary
Solutions fast track
References
Chapter 7. Advanced topics
Introduction
Evading input filters
Exploiting second-order SQL injection
Exploiting client-side SQL injection
Using hybrid attacks
Summary
Solutions fast track
Chapter 8. Code-level defenses
Introduction
Domain Driven Security
Using parameterized statements
Validating input
Encoding output
Canonicalization
Design Techniques to Avoid the Dangers of SQL Injection
Summary
Solutions fast track
Chapter 9. Platform level defenses
Introduction
Using runtime protection
Securing the database
Additional deployment considerations
Summary
Solutions fast track
Chapter 10. Confirming and Recovering from SQL Injection Attacks
Introduction
Investigating a suspected SQL injection attack
So, you’re a victim—now what?
Summary
Solutions fast track
Chapter 11. References
Introduction
Structured query language (SQL) primer
SQL injection quick reference
Bypassing input validation filters
Troubleshooting SQL injection attacks
SQL injection on other platforms
Resources
Solutions fast track
Index
· · · · · · ()

下载地址

发布者:倪耳娘

文件说明:zip / 解压密码:yiquhai.com

迅雷下载:您需要先后,才能查看

网盘下载:您需要先后,才能查看

关于内容:内容自于互联网,如果发现有违规内容请联系管理员删除!

作者: 倪耳娘

该用户很懒,还没有介绍自己。

56 条评论

发表评论

  1. 暗夜尸妖 暗夜尸妖说道:
    1#

    感觉学到了非常多的知识

  2. 单沫雨夜6K5 单沫雨夜6K5说道:
    2#

    思想很新颖

  3. 懿切瀡缘SJ 懿切瀡缘SJ说道:
    3#

    内容严谨

  4. 边城GOD 边城GOD说道:
    4#

    值得一看

  5. 显示更多