database hacker handbook

Written By pcbolong on Tuesday, June 28, 2011 | 12:44 PM

database hacker handbook

Table of Contents
The Database Hacker's Handbook — Defending Database Servers
Preface
Introduction
Part I - Introduction
Chapter 1 - Why Care About Database Security?
Part II - Oracle
Chapter 2 - The Oracle Architecture
Chapter 3 - Attacking Oracle
Chapter 4 - Oracle: Moving Further into the Network
Chapter 5 - Securing Oracle
Part III - DB2
Chapter 6 - IBM DB2 Universal Database
Chapter 7 - DB2: Discovery, Attack, and Defense
Chapter 8 - Attacking DB2
Chapter 9 - Securing DB2
Part IV - Informix
Chapter 10 - The Informix Architecture
Chapter 11 - Informix: Discovery, Attack, and Defense
Chapter 12 - Securing Informix
Part V - Sybase ASE
Chapter 13 - Sybase Architecture
Chapter 14 - Sybase: Discovery, Attack, and Defense
Chapter 15 - Sybase: Moving Further into the Network
Chapter 16 - Securing Sybase
Part VI - MySQL
Chapter 17 - MySQL Architecture
Chapter 18 - MySQL: Discovery, Attack, and Defense
Chapter 19 - MySQL: Moving Further into the Network
Chapter 20 - Securing MySQL
Part VII - SQL Server
Chapter 21 - Microsoft SQL Server Architecture
Chapter 22 - SQL Server: Exploitation, Attack, and Defense
Chapter 23 - Securing SQL Server
Part VIII - PostgreSQL
Chapter 24 - The PostgreSQL Architecture
Chapter 25 - PostgreSQL: Discovery and Attack
Chapter 26 - Securing PostgreSQL http://www.blogger.com/img/blank.gif
Part IX - Appendixes
Appendix A - Example C Code for a Time-Delay SQL Injection Harness
Appendix B - Dangerous Extended Stored Procedures
Appendix C - Oracle Default Usernames and Passwords


Download here

0 comments: