ebooks (PDF, EPUB) and download videosGene Castillon's Redoubling the Double Cut by Jon Racherbaumer17 Days: The Katie Beers Story by Arthur HerzogMagicseen
Home » Nonfiction » Computers  | My Account  | Cart Contents | Checkout  

SQL Injection Attacks and Defense

| £41.30 | €56.58 | Ca$76.56 | Au$78.58
by Justin Clarke
What is this?DRM-EPUB | by download   add to cartadd to wish list
SQL Injection Attacks and Defense by Justin Clarke

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only ebook devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE Share by Email Share on Facebook Share on Twitter Share on Linked In Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 21158

Ebook Details
Pages: 496
Size: 15.3 MB
Publisher: Syngress
Date published:  May 2009
ISBN: 9780080958576

DRM Settings
Read Aloud:  not allowed

Customers who bought this item also bought:

  • Securing PHP Web Applications
  • Bridge Master 2000 - Audrey Grant Edition
  • SQL Fundamentals
  • Mathematica by Example
  • Computer and Information Security Handbook
  • Modelling Systems
  • Relational Database Design and Implementation: Clearly Explained 3e
  • Embedded Systems and Software Validation
  • Real-Time Systems
  • A Practical Guide to Linux Commands, Editors, and Shell Programming
  • Sun Web Server: The Essential Guide
  • Software Architecture in Practice
  • The Process of Software Architecting
  • Effortless Card Magic
  • The Circle Fan
  • PHP for the Web: Visual QuickStart Guide
  • TCP/IP Sockets in C: Practical Guide for Programmers
  • scammersink.con
  • Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
  • Fuzzing for Software Security Testing and Quality Assurance: Advanced Fuzzing
  • Fuzzing for Software Security Testing and Quality Assurance
  • Dr. Tom Shinder's ISA Server and Beyond
  • TCP/IP - The Ultimate Protocol Guide: Volume 2 - Applications, Access and Data Security
  • Face Processing: Advanced Modeling and Methods
  • Chained Exploits: Advanced Hacking Attacks from Start to Finish
  • Jstl: Practical Guide for JSP Programmers

This product is listed in the following category:

Nonfiction > Computers

This author has products in the following categories:

Nonfiction > Computers
Nonfiction > Computers > Database Management
Nonfiction > Computers > Security

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.
Submit 5 page SummaryWhat is this?
Search allTitleAuthor
wildcards: ? (any one char)
* (zero or more)


Livres de Magie en Français
Zauberliteratur in Deutsch
Libri di Magia in Italiano
Libros de Magia en Español

Free Ebooks and Articles

+Antiques & Collectibles
+Biography & Autobiography
+Body, Mind & Spirit
+Business & Economics
 │├Artificial Intelligence
+│├Business Software
 │├Buyer's Guides
 │├CD-DVD Technology
+│├Certification Guides
+│├Client-Server Computing
 │├Cloud Computing
+│├Computer Architecture
 │├Computer Engineering
+│├Computer Graphics
 │├Computer Literacy
 │├Computer Science
 │├Computer Simulation
 │├Computer Vision
 │├Computerized Home & Entertainment
 │├Data Modeling & Design
+│├Data Processing
+│├Data Transmission Systems
 │├Data Visualization
+│├Database Management
+│├Desktop Applications
+│├Digital Media
 │├Disaster Recovery
 │├Document Management
 │├Documentation & Technical Writing
 │├Educational Software
 │├Electronic Commerce
 │├Electronic Publishing
 │├Entertainment & Games
 │├Expert Systems
 │├Financial Applications
 │├Information Storage & Retrieval
 │├Information Technology
 │├Information Theory
 │├Interactive & Multimedia
 │├Logic Design
 │├Machine Theory
 │├Management Information Systems
 │├Mathematical & Statistical Software
 │├Miscellaneous Software
 │├Natural Language Processing
 │├Neural Networks
+│├Online Services
+│├Operating Systems
 │├Presentation Software
+│├Programming Languages
 │├Project Management
+│├Social Aspects
+│├System Administration
 │├User Interfaces
 │├Virtual Reality
+│└Word Processing
+Crafts & Hobbies
+Family & Relationships
+Foreign Language Study
+Health & Fitness
+House & Home
+Juvenile Nonfiction
+Language Arts & Disciplines
+Literary Collections
+Literary Criticism
+Performing Arts
+Political Science
+Social Science
+Sports & Recreation
+Study Aids
+True Crime
+Video & DVD Genre
+Arthur Dailey Photos
 Ernest Hemingway

Navigation Aids
Site Map
News Blog
Tips on Site Usage
Contact Us
About Us
Our Partners
Martin Breese International