Jump to content
M2G

SQL Injection Attacks and Defense

Recommended Posts

bookofthemonth_feb_2010_sqlinjection-attack_defense.jpg

Chapter 1: What is SQL Injection?

Chapter 2: Testing for SQL Injection

Chapter 3: Reviewing Code for SQL Injection

Chapter 4: Exploiting SQL Injection

Chapter 5: Blind SQL Injection Exploitation

Chapter 6: Exploiting the Operating System

Chapter 7: Advanced Topics

Chapter 8: Code-Level Defenses

Chapter 9: Platform-Level Defenses

Chapter 10: References

Download: http://rs59.rapidshare.com/files/293360186/1597494240.pdf

Link to comment
Share on other sites

bookofthemonth_feb_2010_sqlinjection-attack_defense.jpg

Chapter 1: What is SQL Injection?

Chapter 2: Testing for SQL Injection

Chapter 3: Reviewing Code for SQL Injection

Chapter 4: Exploiting SQL Injection

Chapter 5: Blind SQL Injection Exploitation

Chapter 6: Exploiting the Operating System

Chapter 7: Advanced Topics

Chapter 8: Code-Level Defenses

Chapter 9: Platform-Level Defenses

Chapter 10: References

Download: http://rs59.rapidshare.com/files/293360186/1597494240.pdf

a mai fost postata.

http://rstcenter.com/forum/17536-%5Bbook%5D-sql-injection-attacks-defense.rst

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...