ebooks (PDF, EPUB) and download videos (Benny) Ben Harris17 Days: The Katie Beers Story by Arthur HerzogMagicseen Magazine
Home » Nonfiction » Computers

SQL Injection Attacks and Defense

| £40.06 | €57.26 | Ca$81.48 | Au$84.87
by Justin Clarke
What is this?DRM-EPUB | by download   add to cartadd to wish list
SQL Injection Attacks and Defense by Justin Clarke

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only ebook devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 21158

Ebook Details
Pages: 496
Size: 15.3 MB
Publisher: Syngress
Date published:  May 2009
ISBN: 2370002663618 (DRM-EPUB)

DRM Settings
Read Aloud:  not allowed

Customers who bought this item also bought:

  • Hacking Exposed Linux
  • Ubuntu Server Administration
  • Securing PHP Web Applications
  • Bridge Master 2000 - Audrey Grant Edition
  • SQL Fundamentals
  • Cisco ASA Configuration
  • Hacking Exposed, Sixth Edition
  • Mathematica by Example
  • Linux Administration: A Beginner's Guide, Fifth Edition
  • Computer and Information Security Handbook
  • Modelling Systems
  • Relational Database Design and Implementation: Clearly Explained 3e
  • Embedded Systems and Software Validation
  • Real-Time Systems
  • A Practical Guide to Linux Commands, Editors, and Shell Programming
  • Sun Web Server: The Essential Guide
  • Software Architecture in Practice
  • The Process of Software Architecting
  • Effortless Card Magic
  • The Circle Fan
  • PHP for the Web: Visual QuickStart Guide
  • TCP/IP Sockets in C: Practical Guide for Programmers
  • Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
  • Fuzzing for Software Security Testing and Quality Assurance: Advanced Fuzzing
  • Fuzzing for Software Security Testing and Quality Assurance
  • Dr. Tom Shinder's ISA Server and Beyond
  • TCP/IP - The Ultimate Protocol Guide: Volume 2 - Applications, Access and Data Security
  • Face Processing: Advanced Modeling and Methods
  • Chained Exploits: Advanced Hacking Attacks from Start to Finish
  • Jstl: Practical Guide for JSP Programmers

This product is listed in the following category:

Nonfiction > Computers

This author has products in the following categories:

Nonfiction > Computers
Nonfiction > Computers > Database Management
Nonfiction > Computers > Security
If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.
Submit 5 page SummaryWhat is this?
Wednesday 25 November, 2015
Copyright © 2015