Flylib.com
Part IX: Appendixes
Previous page
Table of content
Next page
Appendix A: Example C Code for a Time-Delay SQL Injection Harness
Appendix B: Dangerous Extended Stored Procedures
Appendix C: Oracle Default Usernames and Passwords
Previous page
Table of content
Next page
The Database Hackers Handbook: Defending Database Servers
ISBN: 0764578014
EAN: 2147483647
Year: 2003
Pages: 156
Authors:
David Litchfield
,
Chris Anley
,
John Heasman
,
Bill Grindlay
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Quality: Professional Views
Reliability and Validity
Possible Metrics for Acceptance Testing to Evaluate Vendor-Developed Software
Structure Metrics
Measuring and Analyzing Customer Satisfaction
Managing Enterprise Systems with the Windows Script Host
Introduction
Input/Output Streams
Data Access
Internet Information Server
Exchange Server
Cisco CallManager Fundamentals (2nd Edition)
Call Hunting Constructs
Overview of Circuit-Switched Interfaces
Summary
Appendix B. Cisco Integrated Solutions
QSIG
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Who this book is for
What this book does not cover
Part I: SOA and Web Services Fundamentals
Atomic transactions
Considerations for choosing SOA extensions
Twisted Network Programming Essentials
Starting the Twisted Event Loop
Parsing HTTP Requests
Storing Web Data in an SQL Database
NNTP Clients and Servers
Running Commands on a Remote Server
Cultural Imperative: Global Trends in the 21st Century
Cultural Spectacles
Cognitive Processes
The Pacific Rim: The Fourth Cultural Ecology
Empires Past, Present, and Future
Appendix C National Traits
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies