Flylib.com
Part V: Sybase ASE
Previous page
Table of content
Next page
Chapter List
Chapter 13: Sybase Architecture
Chapter 14: Sybase: Discovery, Attack, and Defense
Chapter 15: Sybase: Moving Further into the Network
Chapter 16: Securing Sybase
Previous page
Table of content
Next page
The Database Hackers Handbook: Defending Database Servers
ISBN: 0764578014
EAN: 2147483647
Year: 2003
Pages: 156
Authors:
David Litchfield
,
Chris Anley
,
John Heasman
,
Bill Grindlay
BUY ON AMAZON
Oracle Developer Forms Techniques
The Power of Record Groups
Window Management in Forms
Myths About the Form Filename, Form Module Name , and Form ID
Object-oriented Methods in Forms
When to Use WHEN-VALIDATE-RECORD and When to Use WHEN-VALIDATE-ITEM
Snort Cookbook
Installing Snort from Source on Unix
Detecting IDS Evasion
Recognizing HTTP Traffic on Unusual Ports
Creating a Reactive IDS
Port Knocking
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity I
IDS and IPS Internals
Snort
Security Business Issues
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 27. Add Google Maps to Any Web Site
Hack 40. The Ghost in Google Ride Finder
Hack 52. Put a Map and HTML into Your Info Windows
Hack 60. Make Things Happen When the Map Moves
Hack 64. Build Custom Icons on the Fly
Information Dashboard Design: The Effective Visual Communication of Data
All That Glitters Is Not Gold
A Timely Opportunity
Encoding Quantitative Data Inaccurately
Eloquence Through Simplicity
Maintain Consistency for Quick and Accurate Interpretation
Sap Bw: a Step By Step Guide for Bw 2.0
Sales Analysis A Business Scenario
Creating an Application Component
Summary
Data Maintenance
Appendix B. SAP Basis Overview
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies