0.0/5
415,00 kr
Each of these will be examined to show how hackers gain access using various methods from buffer overflow exploitation, privilege escalation through SQL, SQL injection and stored procedure and trigger abuse. Also discussed are those techniques that are specific to each database. With each attack topic presented, ways of preventing such abuse will be discussed.