Flylib.com
Part V: Sybase ASE
Previous page
Table of content
Next page
Chapter List
Chapter 13: Sybase Architecture
Chapter 14: Sybase: Discovery, Attack, and Defense
Chapter 15: Sybase: Moving Further into the Network
Chapter 16: Securing Sybase
Previous page
Table of content
Next page
The Database Hackers Handbook: Defending Database Servers
ISBN: 0764578014
EAN: 2147483647
Year: 2003
Pages: 156
Authors:
David Litchfield
,
Chris Anley
,
John Heasman
,
Bill Grindlay
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix A Solutions to Exercises
Inside Network Security Assessment: Guarding Your IT Infrastructure
Introduction to Assessing Network Vulnerabilities
Choosing the Best Risk-Assessment Approach
Compiling the Needed Documentation
Putting Together a Toolkit
Audit and Compliance
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Adding Basic Controls and Lists
Publishing Form Templates
Designing InfoPath Web Service Clients
Introducing InfoPath Form Template Projects
Writing Advanced Event Handlers
Metrics and Models in Software Quality Engineering (2nd Edition)
Orthogonal Defect Classification
Structure Metrics
Object-Oriented Concepts and Constructs
Measuring Process Compliance
Celebrate the Journey, Not Just the Destination
Twisted Network Programming Essentials
Installing Twisted
Web Clients
Enabling Web Services Using XML-RPC
Sending Mail Using SMTP
Looking Up the SMTP Server for a Domain
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Photoshop Layers and After Effects
Cause and Effect
Matte and Keying Plug-ins
Making Movies from Stills
Appendix Adobe Photoshop and After Effects Resources
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies