Goodreads helps you keep track of books you want to read.
Start by marking “SQL Injection Attacks and Defense” as Want to Read:
SQL Injection Attacks and Defense
Enlarge cover
Rate this book
Clear rating
Open Preview

SQL Injection Attacks and Defense

3.78 of 5 stars 3.78  ·  rating details  ·  27 ratings  ·  3 reviews
"SQL Injection Attacks and Defense, First Edition: " Winner of the Best Book Bejtlich Read Award

""SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage."" -Richard Bejtlich, "Tao Security blog "

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on
...more
ebook, 576 pages
Published June 1st 2009 by Syngress Publishing (first published January 1st 2009)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about SQL Injection Attacks and Defense, please sign up.

Be the first to ask a question about SQL Injection Attacks and Defense

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 106)
filter  |  sort: default (?)  |  rating details
Constantin Minov
There are a lot of code injection techniques used to attack applications which use a database as a back-end by inserting malicious SQL statements.These types of injection attacks are first on the list of the top 10 web vulnerabilities.A successful exploitation grants an attacker unauthorized access to all data within a database through a web application, a full system control and the opportunity to use it as a launchpad for attacking others.Many compromised computers are used in cyber attacks an ...more
Sal Fernz
Very useful in understanding how attacks are perpetrated from the URL address bar. I also used several attacks illustrated in the book to test my own web application at http://spideronfire.com
Niels
Amazing. I am afraid that I will have to reread parts of this book again and again. Also I will keep it near just-in-case.
Nissim
Nissim marked it as to-read
Mar 21, 2015
Tonfrere Fi'Allah
Tonfrere Fi'Allah marked it as to-read
Mar 07, 2015
Urvish
Urvish marked it as to-read
Mar 04, 2015
Hassan
Hassan marked it as to-read
Feb 14, 2015
Brad
Brad marked it as to-read
Jan 29, 2015
Computeristgeek
Computeristgeek marked it as to-read
Jan 25, 2015
Mostafa Siraj
Mostafa Siraj marked it as to-read
Jan 20, 2015
Erik Molnar
Erik Molnar marked it as to-read
Dec 05, 2014
Brandon
Brandon marked it as to-read
Nov 27, 2014
Fakir Yahya
Fakir Yahya marked it as to-read
Nov 11, 2014
Ihsan Jami
Ihsan Jami marked it as to-read
Oct 26, 2014
Alexander Koblov
Alexander Koblov marked it as to-read
Oct 17, 2014
Britt Freeman
Britt Freeman marked it as to-read
Oct 08, 2014
Ecenhua Maiz
Ecenhua Maiz marked it as to-read
Sep 14, 2014
Shane
Shane marked it as to-read
Sep 05, 2014
Ty Myhres
Ty Myhres marked it as to-read
Sep 03, 2014
Jake
Jake marked it as to-read
Aug 16, 2014
Jake
Jake added it
Jun 29, 2014
« previous 1 3 4 next »
There are no discussion topics on this book yet. Be the first to start one »

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
Constance Cummings 71 Success Facts - Everything You Need to Know about Constance Cummings Network Security Tools: Writing, Hacking, and Modifying Security Tools Web Application Security Assessment Network Security Tools: Writing, Hacking, and Modifying Security Tools

Share This Book