While Oracle continues to improve the security features of its
product, it still has a long way to go. David Litchfield has
devoted years to relentlessly searching out the flaws in this
ubiquitous database system and creating defenses against them.
Now he offers you his complete arsenal to assess and defend
your own Oracle systems.
This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.
Discover how to deal with the security flaws revealed in the Oracle RDBMS. Explore some never-before-published forays into Oracle security holes and learn to defend them from attack.
6th International Conference, SCN 2008, Amalfi, Italy, September
10-12, 2008, Proceedings
Editors: Rafail Ostrovsky, Roberto De Prisco and Ivan Visconti
Hardcover: 423 pages
Publisher: Springer; 1 edition (September 1, 2008)
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008
The Shellcoders Handbook, discovering and exploiting security holes is the second edition. It covers introduction to exploitation: linux on x86 contains stack overflows, shellcodes, format string bugs, heap overflows. Also for windows platform and solaris exploitation too. OS X shellcode, cisco ios exploitaion, unix kernel overflows, windows kernel hacking, protection mechnism and much more.....!
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.
* This is the first book to explain the newest internet threat Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise.
* Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself.
The world's bestselling computer security book--fully expanded and updated.
* New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking * Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits * The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits * New wireless and RFID security tools, including multilayered encryption and gateways * All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices * Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage * VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking * Fully updated chapters on hacking the Internet user, web hacking, and securing code