Flylib.com
Part VIII: PostgreSQL
Previous page
Table of content
Next page
Chapter List
Chapter 24: The PostgreSQL Architecture
Chapter 25: PostgreSQL: Discovery and Attack
Chapter 26: Securing PostgreSQL
Previous page
Table of content
Next page
The Database Hackers Handbook: Defending Database Servers
ISBN: 0764578014
EAN: 2147483647
Year: 2003
Pages: 156
Authors:
David Litchfield
,
Chris Anley
,
John Heasman
,
Bill Grindlay
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Asymmetric Key Cryptography
Certificate Revocation and Path Validation
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Inside Network Security Assessment: Guarding Your IT Infrastructure
Encryption
The Goals and Objectives of a Risk Assessment
Risk-Assessment Terminology
Ranking Your Findings
Appendix E. SIRT Team Report Format Template
Image Processing with LabVIEW and IMAQ Vision
Image Acquisition
Frequency Filtering
Pattern Matching
Reading Instrument Displays
Image Focus Quality
Systematic Software Testing (Artech House Computer Library)
The Software Tester
Improving the Testing Process
Some Final Thoughts…
Appendix D Sample Master Test Plan
Appendix F Process Diagrams
Extending and Embedding PHP
Complex Structures
Speaking the Windows Dialect
Building and Compiling a Host Application
Advanced Embedding
Calling Back into PHP
Java All-In-One Desk Reference For Dummies
Using Subclasses and Inheritance
Packaging and Documenting Your Classes
Using the ArrayList Class
Handling Events
Animation and Game Programming
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies