SQL injection defenses

This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Nystrom, Marty (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Sebastopol, Calif. O'Reilly 2007
Schriftenreihe:O'Reilly shortcuts
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047496703
003 DE-627-1
005 20240228114116.0
007 cr uuu---uuuuu
008 191023s2007 xx |||||o 00| ||eng c
020 |a 9780596529642  |c electronic bk.  |9 978-0-596-52964-2 
020 |a 0596529643  |c electronic bk.  |9 0-596-52964-3 
035 |a (DE-627-1)047496703 
035 |a (DE-599)KEP047496703 
035 |a (ORHE)9780596529642 
035 |a (DE-627-1)047496703 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
082 0 |a 005.75/85 
100 1 |a Nystrom, Marty  |e VerfasserIn  |4 aut 
245 1 0 |a SQL injection defenses  |c by Martin Nystrom 
264 1 |a Sebastopol, Calif.  |b O'Reilly  |c 2007 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a O'Reilly shortcuts 
500 |a Print version record 
520 |a This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. 
630 2 0 |a SQL server 
650 0 |a Database management 
650 0 |a Data transmission systems 
650 0 |a Client/server computing 
650 0 |a Database security 
650 4 |a SQL server 
650 4 |a SQL server 
650 4 |a Bases de données ; Gestion 
650 4 |a Données ; Transmission 
650 4 |a Architecture client-serveur (Informatique) 
650 4 |a Bases de données ; Sécurité ; Mesures 
650 4 |a COMPUTERS ; Data Processing 
650 4 |a Database management 
650 4 |a Data transmission systems 
650 4 |a Client/server computing 
650 4 |a Database security 
650 4 |a Client/server computing 
650 4 |a Data transmission systems 
650 4 |a Database management 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9780596529642/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047496703
_version_ 1818767330647212032
adam_text
any_adam_object
author Nystrom, Marty
author_facet Nystrom, Marty
author_role aut
author_sort Nystrom, Marty
author_variant m n mn
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047496703
(DE-599)KEP047496703
(ORHE)9780596529642
dewey-full 005.75/85
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.75/85
dewey-search 005.75/85
dewey-sort 15.75 285
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02464cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-047496703</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114116.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596529642</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-596-52964-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596529643</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-596-52964-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047496703</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047496703</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780596529642</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047496703</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.75/85</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nystrom, Marty</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SQL injection defenses</subfield><subfield code="c">by Martin Nystrom</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, Calif.</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">O'Reilly shortcuts</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Données ; Transmission</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture client-serveur (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780596529642/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047496703
illustrated Not Illustrated
indexdate 2024-12-18T08:48:10Z
institution BVB
isbn 9780596529642
0596529643
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2007
publishDateSearch 2007
publishDateSort 2007
publisher O'Reilly
record_format marc
series2 O'Reilly shortcuts
spelling Nystrom, Marty VerfasserIn aut
SQL injection defenses by Martin Nystrom
Sebastopol, Calif. O'Reilly 2007
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
O'Reilly shortcuts
Print version record
This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft.
SQL server
Database management
Data transmission systems
Client/server computing
Database security
Bases de données ; Gestion
Données ; Transmission
Architecture client-serveur (Informatique)
Bases de données ; Sécurité ; Mesures
COMPUTERS ; Data Processing
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780596529642/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Nystrom, Marty
SQL injection defenses
SQL server
Database management
Data transmission systems
Client/server computing
Database security
Bases de données ; Gestion
Données ; Transmission
Architecture client-serveur (Informatique)
Bases de données ; Sécurité ; Mesures
COMPUTERS ; Data Processing
title SQL injection defenses
title_auth SQL injection defenses
title_exact_search SQL injection defenses
title_full SQL injection defenses by Martin Nystrom
title_fullStr SQL injection defenses by Martin Nystrom
title_full_unstemmed SQL injection defenses by Martin Nystrom
title_short SQL injection defenses
title_sort sql injection defenses
topic SQL server
Database management
Data transmission systems
Client/server computing
Database security
Bases de données ; Gestion
Données ; Transmission
Architecture client-serveur (Informatique)
Bases de données ; Sécurité ; Mesures
COMPUTERS ; Data Processing
topic_facet SQL server
Database management
Data transmission systems
Client/server computing
Database security
Bases de données ; Gestion
Données ; Transmission
Architecture client-serveur (Informatique)
Bases de données ; Sécurité ; Mesures
COMPUTERS ; Data Processing
url https://learning.oreilly.com/library/view/-/9780596529642/?ar
work_keys_str_mv AT nystrommarty sqlinjectiondefenses