share_book
Envoyer cet article par e-mail

The Oracle Hacker's Handbook: Hacking and Defending Oracle

ou partager sur :

share_comment
Partager ce commentaire par e-mail

ou partager sur :

PRÊT A ACHETER?
(vous pouvez toujours annuler plus tard)


J'aime
The Oracle Hacker's Handbook: Hacking and Defending Oracle

The Oracle Hacker's Handbook: Hacking and Defending Oracle

  (Auteur)


Prix : Cet article n'a pas encore de prix  ask_price

Demande de cotation sur ""
Ce titre est nouveau dans notre fonds d'ouvrages et nous ne l'avons encore jamais vendu à ce jour.
Notre engagement: Vous obtenir le meilleur prix
Aussi nombreux que soient les titres que nous référençons, absolument rien n'est automatisé dans la fixation de nos prix; et plutôt que de convertir automatiquement le prix en euros et risquer de répercuter sur vous un prix artificiellement élevé, nous vous faisons un devis rapide après avoir vérifié les prix auprès de nos différents fournisseurs.
Cette étape de demande de cotation est rapide (généralement quelques heures) et vise à vous faire bénéficier en permanence du meilleur prix pour vos achats de livres.


Sur commande

Des articles qui pourraient aussi vous intéresser

Description de "The Oracle Hacker's Handbook: Hacking and Defending Oracle"

Knowledge is power, and the power can be yours While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. Like The Shellcoder's Handbook and The Database Hacker's Handbook, this in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure. Discover how to deal with the security flaws revealed in the Oracle RDBMS Explore some never-before-published forays into Oracle security holes and learn to defend them from attack Learn why independent security assessments are not necessarily a guarantee of safety See how Oracle 10g Release 2 has improved its security features and where the flaws remain Take advantage of extensive and valuable code downloads on the companion Web site at www.wiley.com/go/ohh Visit our Web site at www.wiley.com/go/ohh

Détails sur le produit

  • Reliure : Paperback
  • 190  pages
  • Dimensions :  1.5cmx18.5cmx23.4cm
  • Poids : 294.8g
  • Editeur :   Wiley Paru le
  • ISBN :  0470080221
  • EAN13 :  9780470080221
  • Langue : Anglais

D'autres livres de David Litchfield

The Database Hacker's Handbook: Defending Database Servers

The book will cover the how to break into and how to defend the most popular database server software. These include: * Oracle * Microsoft's SQL Server * IBM's DB2 * Postgres * Sybase * MySQL Each of these will be examined to show how hackers gain access using various methods from buffer overflow ex...

Voir tous les livres de David Litchfield

Commentaires sur cet article

Personne n'a encore laissé de commentaire. Soyez le premier!

Laisser un commentaire

Rechercher des articles similaires par rayon

Rechercher par thèmes associés

Knowledge is power, and the power can be yours While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. Like The Shellcoder's Handbook and The Database Hacker's Handbook, this in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure. Discover how to deal with the security flaws revealed in the Oracle RDBMS Explore some never-before-published forays into Oracle security holes and learn to defend them from attack Learn why independent security assessments are not necessarily a guarantee of safety See how Oracle 10g Release 2 has improved its security features and where the flaws remain Take advantage of extensive and valuable code downloads on the companion Web site at www.wiley.com/go/ohh Visit our Web site at www.wiley.com/go/ohh