Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  
Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

The Oracle Hacker's Handbook: Hacking and Defending Oracle
The Oracle Hacker's Handbook: Hacking and Defending Oracle
Date: 08 May 2011, 01:28

Free Download Now     Free register and download UseNet downloader, then you can FREE Download from UseNet.

    Download without Limit " The Oracle Hacker's Handbook: Hacking and Defending Oracle " from UseNet for FREE!
Knowledge is power, and the power can be yours.
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.
Like The Shellcoder's Handbook and The Database Hacker's Handbook, this in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.
Discover how to deal with the security flaws revealed in the Oracle RDBMS
Explore some never-before-published forays into Oracle security holes and learn to defend them from attack
Learn why independent security assessments are not necessarily a guarantee of safety
See how Oracle 10g Release 2 has improved its security features and where the flaws remain
Take advantage of extensive and valuable code downloads on the companion Web site at www.wiley.com/go/ohh
Visit our Web site at www.wiley.com/go/ohh
CONTENTS
The Oracle Hacker's Handbook-Hacking and Defending Oracle
Introduction
Chapter 1 - Overview of the Oracle RDBMS
Chapter 2 - The Oracle Network Architecture
Chapter 3 - Attacking the TNS Listener and Dispatchers
Chapter 4 - Attacking the Authentication Process
Chapter 5 - Oracle and PL/SQL
Chapter 6 - Triggers
Chapter 7 - Indirect Privilege Escalation
Chapter 8 - Defeating Virtual Private Databases
Chapter 9 - Attacking Oracle PL/SQL Web Applications
Chapter 10 - Running Operating System Commands
Chapter 11 - Accessing the File System
Chapter 12 - Accessing the Network
Appendix A - Default Usernames and Passwords
Index
List of Figures
PassWord: www.freebookspot.com

DISCLAIMER:

This site does not store The Oracle Hacker's Handbook: Hacking and Defending Oracle on its server. We only index and link to The Oracle Hacker's Handbook: Hacking and Defending Oracle provided by other sites. Please contact the content providers to delete The Oracle Hacker's Handbook: Hacking and Defending Oracle if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches