SQL injection defenses
This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages....
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Sebastopol, Calif.
O'Reilly
2007
|
Schriftenreihe: | O'Reilly shortcuts
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047496703 | ||
003 | DE-627-1 | ||
005 | 20240228114116.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2007 xx |||||o 00| ||eng c | ||
020 | |a 9780596529642 |c electronic bk. |9 978-0-596-52964-2 | ||
020 | |a 0596529643 |c electronic bk. |9 0-596-52964-3 | ||
035 | |a (DE-627-1)047496703 | ||
035 | |a (DE-599)KEP047496703 | ||
035 | |a (ORHE)9780596529642 | ||
035 | |a (DE-627-1)047496703 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.75/85 | |
100 | 1 | |a Nystrom, Marty |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a SQL injection defenses |c by Martin Nystrom |
264 | 1 | |a Sebastopol, Calif. |b O'Reilly |c 2007 | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a O'Reilly shortcuts | |
500 | |a Print version record | ||
520 | |a This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. | ||
630 | 2 | 0 | |a SQL server |
650 | 0 | |a Database management | |
650 | 0 | |a Data transmission systems | |
650 | 0 | |a Client/server computing | |
650 | 0 | |a Database security | |
650 | 4 | |a SQL server | |
650 | 4 | |a SQL server | |
650 | 4 | |a Bases de données ; Gestion | |
650 | 4 | |a Données ; Transmission | |
650 | 4 | |a Architecture client-serveur (Informatique) | |
650 | 4 | |a Bases de données ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Data Processing | |
650 | 4 | |a Database management | |
650 | 4 | |a Data transmission systems | |
650 | 4 | |a Client/server computing | |
650 | 4 | |a Database security | |
650 | 4 | |a Client/server computing | |
650 | 4 | |a Data transmission systems | |
650 | 4 | |a Database management | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780596529642/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047496703 |
---|---|
_version_ | 1818767330647212032 |
adam_text | |
any_adam_object | |
author | Nystrom, Marty |
author_facet | Nystrom, Marty |
author_role | aut |
author_sort | Nystrom, Marty |
author_variant | m n mn |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047496703 (DE-599)KEP047496703 (ORHE)9780596529642 |
dewey-full | 005.75/85 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.75/85 |
dewey-search | 005.75/85 |
dewey-sort | 15.75 285 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02464cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-047496703</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114116.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596529642</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-596-52964-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596529643</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-596-52964-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047496703</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047496703</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780596529642</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047496703</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.75/85</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nystrom, Marty</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SQL injection defenses</subfield><subfield code="c">by Martin Nystrom</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, Calif.</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">O'Reilly shortcuts</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Données ; Transmission</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture client-serveur (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780596529642/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047496703 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:48:10Z |
institution | BVB |
isbn | 9780596529642 0596529643 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | O'Reilly |
record_format | marc |
series2 | O'Reilly shortcuts |
spelling | Nystrom, Marty VerfasserIn aut SQL injection defenses by Martin Nystrom Sebastopol, Calif. O'Reilly 2007 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier O'Reilly shortcuts Print version record This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. SQL server Database management Data transmission systems Client/server computing Database security Bases de données ; Gestion Données ; Transmission Architecture client-serveur (Informatique) Bases de données ; Sécurité ; Mesures COMPUTERS ; Data Processing TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780596529642/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Nystrom, Marty SQL injection defenses SQL server Database management Data transmission systems Client/server computing Database security Bases de données ; Gestion Données ; Transmission Architecture client-serveur (Informatique) Bases de données ; Sécurité ; Mesures COMPUTERS ; Data Processing |
title | SQL injection defenses |
title_auth | SQL injection defenses |
title_exact_search | SQL injection defenses |
title_full | SQL injection defenses by Martin Nystrom |
title_fullStr | SQL injection defenses by Martin Nystrom |
title_full_unstemmed | SQL injection defenses by Martin Nystrom |
title_short | SQL injection defenses |
title_sort | sql injection defenses |
topic | SQL server Database management Data transmission systems Client/server computing Database security Bases de données ; Gestion Données ; Transmission Architecture client-serveur (Informatique) Bases de données ; Sécurité ; Mesures COMPUTERS ; Data Processing |
topic_facet | SQL server Database management Data transmission systems Client/server computing Database security Bases de données ; Gestion Données ; Transmission Architecture client-serveur (Informatique) Bases de données ; Sécurité ; Mesures COMPUTERS ; Data Processing |
url | https://learning.oreilly.com/library/view/-/9780596529642/?ar |
work_keys_str_mv | AT nystrommarty sqlinjectiondefenses |