SQL injection defenses / by Martin Nystrom.
This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages....
Saved in:
Online Access: |
Full Text (via O'Reilly/Safari) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
Sebastopol, Calif. :
O'Reilly,
2007.
|
Series: | O'Reilly shortcuts.
|
Subjects: |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | b10271696 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 070531s2007 cau o 000 0 eng d | ||
005 | 20240829143808.5 | ||
019 | |a 173611156 |a 856990332 | ||
020 | |a 9780596529642 |q (electronic bk.) | ||
020 | |a 0596529643 |q (electronic bk.) | ||
029 | 1 | |a AU@ |b 000062602844 | |
029 | 1 | |a CHBIS |b 006149717 | |
029 | 1 | |a CHVBK |b 171402375 | |
029 | 1 | |a DEBSZ |b 355422492 | |
029 | 1 | |a DEBSZ |b 397008139 | |
029 | 1 | |a HEBIS |b 291494196 | |
035 | |a (OCoLC)safo137284065 | ||
035 | |a (OCoLC)137284065 |z (OCoLC)173611156 |z (OCoLC)856990332 | ||
037 | |a safo9780596529642 | ||
040 | |a UMI |b eng |e pn |c UMI |d GA0 |d CEF |d OCLCQ |d DEBSZ |d EBLCP |d MHW |d N$T |d OCLCQ |d TEFOD |d OCLCQ |d OCLCF |d OCLCQ |d YDXCP |d FMG |d E7B |d TEFOD |d OCLCQ |d COO |d OCLCQ |d OCLCO |d BRL |d WYU |d UAB |d AU@ |d VT2 |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d KSU |d OCL |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.73.S67 |b N97 2007 | |
100 | 1 | |a Nystrom, Marty. | |
245 | 1 | 0 | |a SQL injection defenses / |c by Martin Nystrom. |
260 | |a Sebastopol, Calif. : |b O'Reilly, |c 2007. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
490 | 1 | |a O'Reilly shortcuts | |
588 | |a Print version record. | ||
520 | |a This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. | ||
505 | 0 | |a Why Should You Care?; Data at Risk; How Applications Work; How Web Applications Work; How SQL Queries Work; How Web Applications Receive Data; Attacks; Motivations; What Makes Attacks Possible?; How Attacks Work; Types of Attacks; Defenses; Defense #1: Code Securely; Defense #2: Monitor for Attacks; Defense #3: Block Attacks; Defense #4: Probe for Vulnerabilities; Conclusion and Bottom Line. | |
630 | 0 | 0 | |a SQL server. |
630 | 0 | 7 | |a SQL server |2 fast |
650 | 0 | |a Database management. | |
650 | 0 | |a Data transmission systems. | |
650 | 0 | |a Client/server computing. | |
650 | 0 | |a Database security. | |
650 | 7 | |a Database security |2 fast | |
650 | 7 | |a Client/server computing |2 fast | |
650 | 7 | |a Data transmission systems |2 fast | |
650 | 7 | |a Database management |2 fast | |
830 | 0 | |a O'Reilly shortcuts. | |
856 | 4 | 0 | |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9780596529642/?ar |z Full Text (via O'Reilly/Safari) |
915 | |a - | ||
956 | |a O'Reilly-Safari eBooks | ||
956 | |b O'Reilly Online Learning: Academic/Public Library Edition | ||
994 | |a 92 |b COD | ||
998 | |b Subsequent record output | ||
999 | f | f | |i be81e090-2f13-5130-9f7a-05d0be5a8394 |s 47b1794f-9eb6-5ae7-a04a-00522fcf7da6 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.73.S67 N97 2007 |h Library of Congress classification |i web |n 1 |