The Oracle hacker's handbook hacking and defending Oracle

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Litchfield, David (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Indianapolis, IN Wiley Technology Pub. ©2007
Schlagworte:
Online-Zugang:DE-1046
DE-1047
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV043104453
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151126s2007 xx o|||| 00||| eng d
020 |a 0470080221  |9 0-470-08022-1 
020 |a 0470133708  |c electronic bk.  |9 0-470-13370-8 
020 |a 9780470080221  |9 978-0-470-08022-1 
020 |a 9780470133705  |c electronic bk.  |9 978-0-470-13370-5 
035 |a (OCoLC)124084262 
035 |a (DE-599)BVBBV043104453 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 005.8  |2 22 
100 1 |a Litchfield, David  |e Verfasser  |4 aut 
245 1 0 |a The Oracle hacker's handbook  |b hacking and defending Oracle  |c David Litchfield 
264 1 |a Indianapolis, IN  |b Wiley Technology Pub.  |c ©2007 
300 |a 1 Online-Ressource (xxi, 190 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes index 
500 |a Ch. 1. Overview of the oracle RDBMS -- Ch. 2. The oracle network architecture -- Ch. 3. Attacking the TNS listener and dispatchers -- Ch. 4. Attacking the authentication process -- Ch. 5. Oracle and PL/SQL -- Ch. 6. Triggers -- Ch. 7. Indirect privilege escalation -- Ch. 8. Defeating virtual private databases -- Ch. 9. Attacking oracle PL/SQL Web applications -- Ch. 10. Running operating system commands -- Ch. 11. Accessing the file system -- Ch. 12. Accessing the network 
630 0 4 |a Oracle (Computer file) 
650 4 |a Database security 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Oracle (Computer file)  |2 blmlsh 
650 7 |a Oracle (Computer file)  |2 fast 
650 7 |a Database security  |2 fast 
650 4 |a Database security 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=190582  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028528644 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=190582  |l DE-1046  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=190582  |l DE-1047  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1819295418660421632
any_adam_object
author Litchfield, David
author_facet Litchfield, David
author_role aut
author_sort Litchfield, David
author_variant d l dl
building Verbundindex
bvnumber BV043104453
collection ZDB-4-EBA
ctrlnum (OCoLC)124084262
(DE-599)BVBBV043104453
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02395nam a2200481zc 4500</leader><controlfield tag="001">BV043104453</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470080221</subfield><subfield code="9">0-470-08022-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470133708</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-13370-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470080221</subfield><subfield code="9">978-0-470-08022-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470133705</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-13370-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)124084262</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043104453</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Litchfield, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Oracle hacker's handbook</subfield><subfield code="b">hacking and defending Oracle</subfield><subfield code="c">David Litchfield</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley Technology Pub.</subfield><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 190 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Ch. 1. Overview of the oracle RDBMS -- Ch. 2. The oracle network architecture -- Ch. 3. Attacking the TNS listener and dispatchers -- Ch. 4. Attacking the authentication process -- Ch. 5. Oracle and PL/SQL -- Ch. 6. Triggers -- Ch. 7. Indirect privilege escalation -- Ch. 8. Defeating virtual private databases -- Ch. 9. Attacking oracle PL/SQL Web applications -- Ch. 10. Running operating system commands -- Ch. 11. Accessing the file system -- Ch. 12. Accessing the network</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Oracle (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Oracle (Computer file)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Oracle (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=190582</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028528644</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=190582</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=190582</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043104453
illustrated Not Illustrated
indexdate 2024-12-24T04:41:54Z
institution BVB
isbn 0470080221
0470133708
9780470080221
9780470133705
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028528644
oclc_num 124084262
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource (xxi, 190 pages)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2007
publishDateSearch 2007
publishDateSort 2007
publisher Wiley Technology Pub.
record_format marc
spelling Litchfield, David Verfasser aut
The Oracle hacker's handbook hacking and defending Oracle David Litchfield
Indianapolis, IN Wiley Technology Pub. ©2007
1 Online-Ressource (xxi, 190 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Includes index
Ch. 1. Overview of the oracle RDBMS -- Ch. 2. The oracle network architecture -- Ch. 3. Attacking the TNS listener and dispatchers -- Ch. 4. Attacking the authentication process -- Ch. 5. Oracle and PL/SQL -- Ch. 6. Triggers -- Ch. 7. Indirect privilege escalation -- Ch. 8. Defeating virtual private databases -- Ch. 9. Attacking oracle PL/SQL Web applications -- Ch. 10. Running operating system commands -- Ch. 11. Accessing the file system -- Ch. 12. Accessing the network
Oracle (Computer file)
Database security
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Oracle (Computer file) blmlsh
Oracle (Computer file) fast
Database security fast
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=190582 Aggregator Volltext
spellingShingle Litchfield, David
The Oracle hacker's handbook hacking and defending Oracle
Oracle (Computer file)
Database security
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Oracle (Computer file) blmlsh
Oracle (Computer file) fast
Database security fast
title The Oracle hacker's handbook hacking and defending Oracle
title_auth The Oracle hacker's handbook hacking and defending Oracle
title_exact_search The Oracle hacker's handbook hacking and defending Oracle
title_full The Oracle hacker's handbook hacking and defending Oracle David Litchfield
title_fullStr The Oracle hacker's handbook hacking and defending Oracle David Litchfield
title_full_unstemmed The Oracle hacker's handbook hacking and defending Oracle David Litchfield
title_short The Oracle hacker's handbook
title_sort the oracle hacker s handbook hacking and defending oracle
title_sub hacking and defending Oracle
topic Oracle (Computer file)
Database security
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Oracle (Computer file) blmlsh
Oracle (Computer file) fast
Database security fast
topic_facet Oracle (Computer file)
Database security
COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=190582
work_keys_str_mv AT litchfielddavid theoraclehackershandbookhackinganddefendingoracle