Jump to ratings and reviews
Rate this book

SQL Injection Attacks and Defense

Rate this book
SQL Injection Attacks and Defense, First Winner of the Best Book Bejtlich Read Award " SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Attacks and Defense, Second Edition is the only book devoted exclusively to this long-established but recently growing threat. This is the definitive resource for understanding, finding, exploiting, and defending against this increasingly popular and particularly destructive type of Internet-based attack. SQL Injection Attacks and Defense, Second Edition includes all the currently known information about these attacks and significant insight from its team of SQL injection experts, who tell you

576 pages, Paperback

First published January 1, 2009

15 people are currently reading
143 people want to read

About the author

Justin Clarke

16 books2 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
9 (15%)
4 stars
29 (50%)
3 stars
16 (28%)
2 stars
3 (5%)
1 star
0 (0%)
Displaying 1 - 3 of 3 reviews
Profile Image for Constantin Minov.
77 reviews24 followers
May 14, 2014
There are a lot of code injection techniques used to attack applications which use a database as a back-end by inserting malicious SQL statements.These types of injection attacks are first on the list of the top 10 web vulnerabilities.A successful exploitation grants an attacker unauthorized access to all data within a database through a web application, a full system control and the opportunity to use it as a launchpad for attacking others.Many compromised computers are used in cyber attacks and are being controlled by someone , in every region of the world.This book is about how to identify vulnerabilities and prevent SQL injection attacks,by knowing how things work can help preventing confidential data disclosure and being compromised repeatedly, it also explains in depth how SQL statements can be manipulated and how malicious code are injected.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.