The Database Hacker's Handbook Defending Database

Author: David Litchfield Chris Anley John Heasman Bill Gri,David Litchfield, Chris Anley

Publisher: John Wiley & Sons

ISBN: 9788126506156

Category:

Page: 500

View: 2703

Business & Economics

Computer Security Handbook, Set

Author: Seymour Bosworth,M. E. Kabay,Eric Whyne

Publisher: John Wiley & Sons

ISBN: 1118851749

Category: Business & Economics

Page: 2000

View: 1353

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.
Computers

Relational Database Design and Implementation

Clearly Explained

Author: Jan L. Harrington

Publisher: Morgan Kaufmann

ISBN: 9780080885018

Category: Computers

Page: 440

View: 927

Fully revised, updated, and expanded, Relational Database Design and Implementation, Third Edition is the most lucid and effective introduction to the subject available for IT/IS professionals interested in honing their skills in database design, implementation, and administration. This book provides the conceptual and practical information necessary to develop a design and management scheme that ensures data accuracy and user satisfaction while optimizing performance, regardless of experience level or choice of DBMS. The book begins by reviewing basic concepts of databases and database design, then briefly reviews the SQL one would use to create databases. Topics such as the relational data model, normalization, data entities and Codd's Rules (and why they are important) are covered clearly and concisely but without resorting to "Dummies"-style talking down to the reader. Supporting the book's step-by-step instruction are three NEW case studies illustrating database planning, analysis, design, and management practices. In addition to these real-world examples, which include object-relational design techniques, an entirely NEW section consisting of three chapters is devoted to database implementation and management issues. * Principles needed to understand the basis of good relational database design and implementation practices. * Examples to illustrate core concepts for enhanced comprehension and to put the book's practical instruction to work. * Methods for tailoring DB design to the environment in which the database will run and the uses to which it will be put. * Design approaches that ensure data accuracy and consistency. * Examples of how design can inhibit or boost database application performance. * Object-relational design techniques, benefits, and examples. * Instructions on how to choose and use a normalization technique. * Guidelines for understanding and applying Codd's rules. * Tools to implement a relational design using SQL. * Techniques for using CASE tools for database design.
Computers

The Oracle Hacker's Handbook

Hacking and Defending Oracle

Author: David Litchfield

Publisher: John Wiley & Sons

ISBN: 0470133708

Category: Computers

Page: 216

View: 2662

David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.
Computers

The Shellcoder's Handbook

Discovering and Exploiting Security Holes

Author: Chris Anley,John Heasman,Felix Lindner,Gerardo Richarte

Publisher: John Wiley & Sons

ISBN: 1118079124

Category: Computers

Page: 744

View: 3481

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files
Computers

Hacken für Dummies

Author: Kevin Beaver

Publisher: John Wiley & Sons

ISBN: 3527819045

Category: Computers

Page: 408

View: 2393

Computers

The Web Application Hacker's Handbook

Finding and Exploiting Security Flaws

Author: Dafydd Stuttard,Marcus Pinto

Publisher: John Wiley & Sons

ISBN: 1118175247

Category: Computers

Page: 912

View: 7062

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.
Biography & Autobiography

Grenzgänge

Sozialismus, aus der Froschperspektive betrachtet auch: aus dem Leben eines real existierenden Taugenichts

Author: Judith Hodosi

Publisher: N.A

ISBN: N.A

Category: Biography & Autobiography

Page: 319

View: 606

Fiction

Insel meiner Sehnsucht

Author: Josie Litton

Publisher: Edel:Books

ISBN: 3955303101

Category: Fiction

Page: 416

View: 4214

Kassandra, die schöne Prinzessin von Akora, erfüllt sich einen Traum: Immer schon wollte sie nach London – und einen wahren Gentleman kennen lernen. Der gut aussehende Lord Royce Hawkforte ist allerdings kaum der Mann ihrer Träume: Er ist ungezogen und allzu sehr von sich überzeugt. Doch dann wird der akoranische König gestürzt. Und nur der furchtlose Royce kann Kassandra jetzt unversehrt nach Hause und auf den Thron bringen ...
Computers

Mehr Hacking mit Python

Eigene Tools entwickeln für Hacker und Pentester

Author: Justin Seitz

Publisher: dpunkt.verlag

ISBN: 3864917530

Category: Computers

Page: 182

View: 425

Wenn es um die Entwicklung leistungsfähiger und effizienter Hacking-Tools geht, ist Python für die meisten Sicherheitsanalytiker die Sprache der Wahl. Doch wie genau funktioniert das? In dem neuesten Buch von Justin Seitz - dem Autor des Bestsellers »Hacking mit Python« - entdecken Sie Pythons dunkle Seite. Sie entwickeln Netzwerk-Sniffer, manipulieren Pakete, infizieren virtuelle Maschinen, schaffen unsichtbare Trojaner und vieles mehr. Sie lernen praktisch, wie man • einen »Command-and-Control«-Trojaner mittels GitHub schafft • Sandboxing erkennt und gängige Malware-Aufgaben wie Keylogging und Screenshotting automatisiert • Windows-Rechte mittels kreativer Prozesskontrolle ausweitet • offensive Speicherforensik-Tricks nutzt, um Passwort-Hashes abzugreifen und Shellcode in virtuelle Maschinen einzuspeisen • das beliebte Web-Hacking-Tool Burp erweitert • die Windows COM-Automatisierung nutzt, um einen Man-in-the-Middle-Angriff durchzuführen • möglichst unbemerkt Daten aus einem Netzwerk abgreift Eine Reihe von Insider-Techniken und kreativen Aufgaben zeigen Ihnen, wie Sie die Hacks erweitern und eigene Exploits entwickeln können.
Computer networks

Hacking

Die Kunst des Exploits

Author: Jon Erickson

Publisher: N.A

ISBN: 9783898645362

Category: Computer networks

Page: 505

View: 3488

Computer networks

Netzwerksicherheit Hacks

Author: Andrew Lockhart

Publisher: O'Reilly Germany

ISBN: 3897214962

Category: Computer networks

Page: 504

View: 2782

Computers

The Hacker's Handbook

The Strategy Behind Breaking into and Defending Networks

Author: Susan Young,Dave Aitel

Publisher: CRC Press

ISBN: 9780203490044

Category: Computers

Page: 896

View: 7688

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a “path” to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.
Fiction

Kuckucksei

Die Jagd auf die deutschen Hacker, die das Pentagon knackten

Author: Clifford Stoll

Publisher: S. Fischer Verlag

ISBN: 3105607242

Category: Fiction

Page: 454

View: 7940

›Kuckucksei‹ schildert bis ins Detail die hochdramatische Jagd nach deutschen Hackern, die in amerikanische Computernetze eingedrungen waren. Es ist der autobiografische Report eines amerikanischen Computercracks, der leidenschaftlich für die Sicherheit der Datennetze kämpft. (Dieser Text bezieht sich auf eine frühere Ausgabe.)
Political Science

Inside Anonymous

Aus dem Innenleben des globalen Cyber-Aufstands

Author: Parmy Olson

Publisher: Redline Wirtschaft

ISBN: 3864142806

Category: Political Science

Page: 480

View: 6560

Erstmals packen die Hacker aus. Ende des Jahres 2010 nahmen weltweit Tausende an den digitalen Angriffen der Hackergruppe Anonymous auf die Webseiten von VISA, MasterCard und PayPal teil, um gegen die Sperrung der Konten von Wiki-Leaks zu protestieren. Splittergruppen von Anonymous infiltrierten die Netzwerke der totalitären Regime von Libyen und Tunesien. Eine Gruppe namens LulzSec schaffte es sogar, das FBI, die CIA und Sony zu attackieren, bevor sie sich wieder auflöste. Das Anonymous-Kollektiv wurde bekannt durch die charakteristische Guy-Fawkes-Maske, mit der sich die Aktivisten tarnen. Es steht für Spaß-Guerilla und politische Netzaktivisten ohne erkennbare Struktur, die mit Hacking-Attacken gegen die Scientology-Sekte und Internetzensur protestierten. Internetsicherheitsdienste und bald auch die gesamte Welt merkten schnell, dass Anonymous eine Bewegung war, die man sehr ernst nehmen sollte. Doch wer verbirgt sich eigentlich hinter den Masken? Inside Anonymous erzählt erstmalig die Geschichte dreier Mitglieder des harten Kerns: ihren Werdegang und ihre ganz persönliche Motivation, die sie zu überzeugten Hackern machte. Basierend auf vielen exklusiven Interviews bietet das Buch einen einzigartigen und spannenden Einblick in die Köpfe, die hinter der virtuellen Community stehen.
Fiction

Verschwörung

Millennium 4 - Roman

Author: David Lagercrantz

Publisher: Heyne Verlag

ISBN: 3641153565

Category: Fiction

Page: 608

View: 4388

Mikael Blomkvist steht vor einer Entscheidung. Böse Zungen behaupten, er sei nicht länger der Journalist, der er einst war. Lisbeth Salander hingegen ist aktiv wie eh und je. Die Wege kreuzen sich, als Frans Balder, einer der weltweit führenden Experten für künstliche Intelligenz, ermordet wird. Kurz vor seinem Tod hatte er Mikael Blomkvist brisante Informationen versprochen. Als Blomkvist erfährt, dass Balder auch in Kontakt zu Lisbeth Salander stand, nimmt er die Recherche auf. Die Spur führt zu einem amerikanischen Softwarekonzern, der mit der NSA verknüpft ist. Mikael Blomkvist wittert seine Chance, die Enthüllungsstory zu schreiben, die er so dringend braucht. Doch wie immer verfolgt Lisbeth Salander ihre ganz eigene Agenda.