SQL Injection Attacks and DefensePaperback
Free delivery worldwide
Dispatched in 2 business days
When will my order arrive?
- Publisher: Syngress Media,U.S.
- Format: Paperback | 576 pages
- Dimensions: 185mm x 229mm x 38mm | 1,134g
- Publication date: 27 July 2012
- Publication City/Country: Rockland, MA
- ISBN 10: 1597499633
- ISBN 13: 9781597499637
- Edition: 2, Revised
- Edition statement: 2nd Revised edition
- Sales rank: 288,653
"SQL Injection Attacks and Defense, First Edition": Winner of the Best Book Bejtlich Read Award. "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage". (Richard Bejtlich, Tao Security blog). SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. "SQL Injection Attacks and Defense, Second Edition" is the only book devoted exclusively to this long-established but recently growing threat. This is the definitive resource for understanding, finding, exploiting, and defending against this increasingly popular and particularly destructive type of Internet-based attack. "SQL Injection Attacks and Defense, Second Edition" includes all the currently known information about these attacks and significant insight from its team of SQL injection experts, who tell you about: understanding SQL Injection - understand what it is and how it works; find, confirm and automate SQL injection discovery; tips and tricks for finding SQL injection within code; create exploits for using SQL injection; design apps to avoid the dangers these attacks; SQL injection on different databases; SQL injection on different technologies; SQL injection testing techniques, and Case Studies. "Securing SQL Server, Second Edition" is the only book to provide a complete understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures. It covers unique, publicly unavailable information, by technical experts in such areas as Oracle, Microsoft SQL Server, and MySQL - including new developments for Microsoft SQL Server 2012 (Denali). It is written by an established expert, author, and speaker in the field, with contributions from a team of equally renowned creators of SQL injection tools, applications, and educational materials.
Other people who viewed this bought:
USD$16.08 - Save $7.43 31% off - RRP $23.51
USD$31.79 - Save $19.76 38% off - RRP $51.55
USD$47.49 - Save $19.23 28% off - RRP $66.72
USD$41.94 - Save $17.20 29% off - RRP $59.14
USD$54.56 - Save $1.54 (2%) - RRP $56.10
USD$64.23 - Save $4.01 (5%) - RRP $68.24
Other books in this category
USD$47.49 - Save $19.23 28% off - RRP $66.72
USD$44.03 - Save $22.69 34% off - RRP $66.72
USD$48.63 - Save $18.09 27% off - RRP $66.72
USD$35.16 - Save $11.84 25% off - RRP $47.00
USD$54.95 - Save $11.77 17% off - RRP $66.72
USD$25.33 - Save $10.31 28% off - RRP $35.64
Justin Clarke (CISSP, CISM, CISA, MCSE, CEH) is a cofounder and executive director of Gotham Digital Science, based in the United Kingdom. He has over ten years of experience in testing the security of networks, web applications, and wireless networks for large financial, retail, and technology clients in the United States, the United Kingdom and New Zealand.
"Lead author and technical editor Clarke has organized the volume's 11 chapters into sections on understanding, finding, exploiting, and defending SQL injection, and has also included reference materials that provide information on database platforms not covered in detail in the main body of the text."--Reference and Research Book News, August 2013 "The most stunningly impactful attacks often leverage SQL Injection vulnerabilities. This book has everything you need to fight back, from applying the core fundamentals to protecting emerging technologies against such attacks. Keep it by your bedside and distribute it within your business."--Nitesh Dhanjani, Executive Director at Ernst & Young LLP "Securing SQL Server - Protecting Your Database from Attackers and SQL Injection Attacks and Defense are two new books out on SQL security. The first, Securing SQL Server - Protecting Your Database from Attackers, author Denny Cherry takes a high-level approach to the topic. The book explains how to secure and protect a SQL database from attack. The book details how to configure SQL against both internal and external-based attacks. This updated edition includes new chapters on analysis services, reporting services, and storage area network security. For anyone new to SQL security, Cherry does a great job of explaining what needs to be done in this valuable guide. In and SQL Injection Attacks and Defense, editor Justin Clarke enlists the help of a set of experts on how to deal with SQL injection attacks. Since SQL is so ubiquitous on corporate networks, with sites often running hundreds of SQL servers; SQL is prone to attacks. SQL injection is a technique often used to attack databases through a website and is often done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. SQL injection is a code injection technique that exploits security vulnerability in a website's software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. With that, the need to defend servers against such attacks is an imperative and SQL Injection Attacks and Defense should be required reading for anyone tasks with securing SQL servers."--RSA Conference
Table of contents
Chapter 1. Introduction Chapter 2. History of SQL Injection Chapter 3. Understanding SQL Injection Chapter 4. SQL Injection on Different Databases Chapter 5. SQL Injection on Different Technologies Chapter 6. SQL Injection Testing Techniques Chapter 7. Defenses Chapter 8. Case Studies Appendices - SQL Injection Cheat Sheet