Flylib.com
Part IX: Appendixes
Previous page
Table of content
Next page
Appendix A: Example C Code for a Time-Delay SQL Injection Harness
Appendix B: Dangerous Extended Stored Procedures
Appendix C: Oracle Default Usernames and Passwords
Previous page
Table of content
Next page
The Database Hackers Handbook: Defending Database Servers
ISBN: 0764578014
EAN: 2147483647
Year: 2003
Pages: 156
Authors:
David Litchfield
,
Chris Anley
,
John Heasman
,
Bill Grindlay
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
System Memory
Process Group ID
Introduction
Using RPCGEN to Generate Templates and a MAKEFILE
Appendix B. UNIX Error Messages
Certified Ethical Hacker Exam Prep
The Technical Foundations of Hacking
Digital Signatures
Encryption Cracking and Tools
Physical Security
Hacking Web Servers
The Complete Cisco VPN Configuration Guide
Overview of VPNs
Key Exchange
Cisco VPN Client Interface
Windows Client
Case Study
MySQL Cookbook
Writing Strings That Include Quotes or Special Characters
Eliminating Duplicates by Adding an Index
Per-Group Descriptive Statistics
Verifying Transaction Support Requirements
Appendix A. Obtaining MySQL Software
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Getting the Data into an HTML Table
Why Write Scripts?
Commenting Your Scripts
Limitations of SQL*Plus
What Is the Product User Profile?
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
XML
Printing and Drawing with GDI+
Windows Services
ADO.NET
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies