SQL injection defenses / by Martin Nystrom.

This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages....

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via O'Reilly/Safari)
Main Author: Nystrom, Marty
Format: eBook
Language:English
Published: Sebastopol, Calif. : O'Reilly, 2007.
Series:O'Reilly shortcuts.
Subjects:

MARC

LEADER 00000cam a2200000 a 4500
001 b10271696
006 m o d
007 cr |||||||||||
008 070531s2007 cau o 000 0 eng d
005 20240829143808.5
019 |a 173611156  |a 856990332 
020 |a 9780596529642  |q (electronic bk.) 
020 |a 0596529643  |q (electronic bk.) 
029 1 |a AU@  |b 000062602844 
029 1 |a CHBIS  |b 006149717 
029 1 |a CHVBK  |b 171402375 
029 1 |a DEBSZ  |b 355422492 
029 1 |a DEBSZ  |b 397008139 
029 1 |a HEBIS  |b 291494196 
035 |a (OCoLC)safo137284065 
035 |a (OCoLC)137284065  |z (OCoLC)173611156  |z (OCoLC)856990332 
037 |a safo9780596529642 
040 |a UMI  |b eng  |e pn  |c UMI  |d GA0  |d CEF  |d OCLCQ  |d DEBSZ  |d EBLCP  |d MHW  |d N$T  |d OCLCQ  |d TEFOD  |d OCLCQ  |d OCLCF  |d OCLCQ  |d YDXCP  |d FMG  |d E7B  |d TEFOD  |d OCLCQ  |d COO  |d OCLCQ  |d OCLCO  |d BRL  |d WYU  |d UAB  |d AU@  |d VT2  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d KSU  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.73.S67  |b N97 2007 
100 1 |a Nystrom, Marty. 
245 1 0 |a SQL injection defenses /  |c by Martin Nystrom. 
260 |a Sebastopol, Calif. :  |b O'Reilly,  |c 2007. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
490 1 |a O'Reilly shortcuts 
588 |a Print version record. 
520 |a This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. 
505 0 |a Why Should You Care?; Data at Risk; How Applications Work; How Web Applications Work; How SQL Queries Work; How Web Applications Receive Data; Attacks; Motivations; What Makes Attacks Possible?; How Attacks Work; Types of Attacks; Defenses; Defense #1: Code Securely; Defense #2: Monitor for Attacks; Defense #3: Block Attacks; Defense #4: Probe for Vulnerabilities; Conclusion and Bottom Line. 
630 0 0 |a SQL server. 
630 0 7 |a SQL server  |2 fast 
650 0 |a Database management. 
650 0 |a Data transmission systems. 
650 0 |a Client/server computing. 
650 0 |a Database security. 
650 7 |a Database security  |2 fast 
650 7 |a Client/server computing  |2 fast 
650 7 |a Data transmission systems  |2 fast 
650 7 |a Database management  |2 fast 
830 0 |a O'Reilly shortcuts. 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9780596529642/?ar  |z Full Text (via O'Reilly/Safari) 
915 |a - 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i be81e090-2f13-5130-9f7a-05d0be5a8394  |s 47b1794f-9eb6-5ae7-a04a-00522fcf7da6 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.73.S67 N97 2007  |h Library of Congress classification  |i web  |n 1