by
Shema, Mike, author.
Format:
Books
Publication Date
2012
Excerpt:
) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design
by
Ciampa, Mark D.
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Format:
Books
Publication Date
2012
Excerpt:
topics such as SQL injection, rootkits and virtualization.
by
Golding, Paul, 1968-
Format:
Books
Publication Date
2011
Excerpt:
referred to as "No-SQL" databases. In addition, it tackles the newest areas of technology such as web and
by
Coronel, Carlos.
Format:
Books
Publication Date
2011
Excerpt:
. Introduction to structured query language (SQL) -- 8. Advanced SQL -- 9. Database design -- Part IV. Advanced
by
Gosselin, Don.
Format:
Books
Publication Date
2011
Excerpt:
with PHP -- Error handling and debugging -- Connecting to SQL server and Oracle databases.
Limit Search Results
Narrowed by: