Litchfield, 2007 - Google Patents
The Oracle hacker's handbook: hacking and defending OracleLitchfield, 2007
- Document ID
- 13164264538564400957
- Author
- Litchfield D
- Publication year
External Links
Snippet
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every …
- 238000000034 method 0 abstract description 125
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109643285B (en) | Encrypted user data transmission and storage | |
Litchfield | The Database Hacker's Handbook: Defending Database Servers | |
Johari et al. | A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection | |
Kienzle et al. | Security patterns repository version 1.0 | |
Lockhart | Network Security Hacks: Tips & Tools for Protecting Your Privacy | |
Atashzar et al. | A survey on web application vulnerabilities and countermeasures | |
Curphey et al. | A guide to building secure web applications | |
Litchfield | The Oracle hacker's handbook: hacking and defending Oracle | |
Ozkan et al. | Security analysis of mobile authenticator applications | |
Kumar | J2EE Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice | |
Sharif | Web attacks analysis and mitigation techniques | |
Marchesini et al. | Keyjacking: the surprising insecurity of client-side SSL | |
Lakhe | Practical Hadoop Security | |
Barde | Blockchain-based cyber security | |
Kamruzzaman et al. | Cybersecurity Threats using Application Programming Interface (API) | |
Stahnke | Pro OpenSSH | |
Huszti | Security Analysis of Android Applications | |
Yergaliyev | Continuous security testing for an existing client-server application | |
Wright | Protecting Oracle Database 12c | |
Mookhey et al. | Linux: Security, Audit and Control Features | |
Mirre | Nástroj pro monitoring kompromitace hesel | |
Nu1L Team | Advanced Web Challenges | |
Neagu | Oracle 11g Anti-hacker's Cookbook | |
Svensk | Mobile Device Security: Exploring the Possibilities and Limitations with Bring Your Own Device (BYOD) | |
Mischel | ModSecurity 2.5 |