Databases are the nerve center of our economy. Every piece of your  personal information is stored there-medical records, bank accounts,  employment history, pensions, car registrations, even your children's  grades and what groceries you buy. Database attacks are potentially  crippling-and relentless.
In this  essential follow-up to The Shellcoder's Handbook, four of the world's  top security experts teach you to break into and defend the seven most  popular database servers. You'll learn how to identify vulnerabilities,  how attacks are carried out, and how to stop the carnage. The bad guys  already know all this. You need to know it too.
* Identify and plug  the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best  defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
*  Discover how buffer overflow exploitation, privilege escalation through  SQL, stored procedure or trigger abuse, and SQL injection enable hacker  access
* Recognize vulnerabilities peculiar to each database
*  Find out what the attackers already know
From the Back  Cover
Databases are the nerve center of our economy. Every  piece of your personal information is stored there—medical records, bank  accounts, employment history, pensions, car registrations, even your  children's grades and what groceries you buy. Database attacks are  potentially crippling—and relentless.
In this essential follow-up  to The Shellcoder's Handbook, four of the world's top security experts  teach you to break into and defend the seven most popular database  servers. You'll learn how to identify vulnerabilities, how attacks are  carried out, and how to stop the carnage. The bad guys already know all  this. You need to know it too.
* Identify and plug the new  holes in Oracle and Microsoft® SQL Server
* Learn the best  defenses for IBM's DB2®, PostgreSQL, Sybase ASE, and MySQL® servers
* Discover how buffer overflow exploitation, privilege escalation  through SQL, stored procedure or trigger abuse, and SQL injection enable  hacker access
* Recognize vulnerabilities peculiar to each  database
* Find out what the attackers already know
Download  Link
The Database Hacker's Handbook: Defending Database Servers
Labels: Hacking