|刊登類別:
有類似物品要出售?

TRAVELER'S GUIDE TO SPACETIME, EINSTEIN: BROWNIAN MOVEMENT, RELATIVITY EXPLOSIO

狀況:
良好
Spine/binding firm and clean interiors. Laminate beginning to loosen in small spots on Einstein ... 閱讀更多內容關於物品狀況
剩下 1 批(每批 3 件物品)
價格:
US $12.00
大約HK$ 93.62
運費:
免費 經濟運送方式. 查看詳情— 運送
所在地:Harrison, Tennessee, 美國
送達日期:
估計於 5月21日, 二5月23日, 四之間送達 運送地點 43230
估計運送時間是透過我們的獨家工具,根據買家與物品所在地的距離、所選的運送服務、賣家的運送紀錄及其他因素,計算大概的時間。送達時間會因時而異,尤其是節日。
退貨:
30 日退貨. 由買家支付退貨運費. 查看詳情- 更多退貨相關資訊
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)

賣家資料

賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:353881433361

此物品銷售金額的 10% 將捐助 The Salvation Army Charlotte ARC

The Salvation Army's Adult Rehabilitation Center in Charlotte, NC offers spiritual, emotional, and social assistance to those who have lost the ability to cope with their problems and provide for ...
  • eBay for Charity 刊登物品官方版。進一步了解
  • 此次銷售所得將捐贈經確認的非牟利機構夥伴。

物品細節

物品狀況
良好
曾被閱讀過的書籍,但狀況良好。封面有諸如磨痕等在內的極少損壞,但沒有穿孔或破損。精裝本書籍可能沒有書皮。封皮稍有磨損。絕大多數書頁未受損,存在極少的褶皺和破損。使用鉛筆標注文字處極少,未對文字標記,無留白處書寫文字。沒有缺頁。 查看所有物品狀況定義會在新視窗或分頁中開啟
賣家備註
“Spine/binding firm and clean interiors. Laminate beginning to loosen in small spots on Einstein ...
Country/Region of Manufacture
United States
Topic
Relativity, Brownian Movement, Quasars / Pulsars, Atomic Clocks, Physics
Book Title
A TRAVELER'S GUIDE TO SPACETIME
Subjects
Mathematics & Sciences
Age Level
Adults
ISBN
9780470080221
Publication Year
2007
Type
Textbook
Format
Perfect / Online Resource
Language
English
Publication Name
Oracle Hacker's Handbook : Hacking and Defending Oracle
Item Height
0.5in
Author
David Litchfield
Item Length
9.3in
Publisher
Wiley & Sons, Incorporated, John
Item Width
7.4in
Item Weight
12 Oz
Number of Pages
216 Pages

關於產品

Product Information

David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0470080221
ISBN-13
9780470080221
eBay Product ID (ePID)
56984506

Product Key Features

Author
David Litchfield
Publication Name
Oracle Hacker's Handbook : Hacking and Defending Oracle
Format
Perfect / Online Resource
Language
English
Publication Year
2007
Type
Textbook
Number of Pages
216 Pages

Dimensions

Item Length
9.3in
Item Height
0.5in
Item Width
7.4in
Item Weight
12 Oz

Additional Product Features

Lc Classification Number
Qa76.9.D314.L58 2007
Table of Content
About the Author. Acknowledgments. Introduction. Code Samples from the Book. Oracle and Security. The ?Unbreakable? Marketing Campaign. Independent Security Assessments. The Future. Chapter 1 Overview of the Oracle RDBMS. Architecture. Processes. The File System. The Network. Database Objects. Users and Roles. Privileges. Oracle Patching. Wrapping Up. Chapter 2 The Oracle Network Architecture. The TNS Protocol. The TNS Header. Inside the Packet. Getting the Oracle Version. The Listener Version and Status Command. Using the TNS Protocol Version. Using the XML Database Version. Using TNS Error Text. Using the TNS Version TTC Function. Wrapping Up. Chapter 3 Attacking the TNS Listener and Dispatchers. Attacking the TNS Listener. Bypassing 10g Listener Restrictions. The Aurora GIOP Server. The XML Database. Wrapping Up. Chapter 4 Attacking the Authentication Process. How Authentication Works. Attacks Against the Crypto Aspects. Default Usernames and Passwords. Looking in Files for Passwords. Account Enumeration and Brute Force. Long Username Buffer Overflows. Wrapping Up. Chapter 5 Oracle and PL/SQL. What Is PL/SQL? PL/SQL Execution Privileges. Wrapped PL/SQL. Wrapping and Unwrapping on 10g. Wrapping and Unwrapping on 9i and Earlier. Working without the Source. PL/SQL Injection. Injection into SELECT Statements to Get More Data. Injecting Functions. Injecting into Anonymous PL/SQL Blocks. The Holy Grail of PLSQL Injection. Investigating Flaws. Direct SQL Execution Flaws. PL/SQL Race Conditions. Auditing PL/SQL Code. The DBMS_ASSERT Package. Some Real-World Examples. Exploiting DBMS_CDC_IMPDP. Exploiting LT. Exploiting DBMS_CDC_SUBSCRIBE and DBMS_CDC_ISUBSCRIBE. PLSQL and Triggers. Wrapping Up. Chapter 6 Triggers. Trigger Happy: Exploiting Triggers for Fun and Profit. Examples of Exploiting Triggers. The MDSYS.SDO_GEOM_TRIG_INS1 and SDO_GEOM_TRIG_INS1Triggers. The MDSYS SDO_CMT_CBK_TRIG Trigger. The SYS.CDC_DROP_CTABLE_BEFORE Trigger. The MDSYS.SDO_DROP_USER_BEFORE Trigger. Wrapping Up. Chapter 7 Indirect Privilege Escalation. AHop, a Step, and a Jump: Getting DBA Privileges Indirectly. Getting DBA from CREATE ANY TRIGGER. Getting DBA from CREATE ANY VIEW. Getting DBA from EXECUTE ANY PROCEDURE. Getting DBA from Just CREATE PROCEDURE. Wrapping Up. Chapter 8 Defeating Virtual Private Databases. Tricking Oracle into Dropping a Policy. Defeating VPDs with Raw File Access. General Privileges. Wrapping Up. Chapter 9 Attacking Oracle PL/SQL Web Applications. Oracle PL/SQL Gateway Architecture. Recognizing the Oracle PL/SQL Gateway. PL/SQL Gateway URLs. Oracle Portal. Verifying the Existence of the Oracle PL/SQL Gateway. The Web Server HTTP Server Response Header. How the Oracle PL/SQL Gateway Communicates with the DatabaseServer. Attacking the PL/SQL Gateway. The PLSQL Exclusion List. Wrapping Up. Chapter 10 Running Operating System Commands. Running OS Commands through PL/SQL. Running OS Commands through Java. Running OS Commands Using DBMS_SCHEDULER. Running OS Commands Directly with the Job Scheduler. Running OS Commands Using ALTER SYSTEM. Wrapping Up. Chapter 11 Accessing the File System. Accessing the File System Using the UTL_FILE Package. Accessing the File System Using Java. Accessing Binary Files. Exploring Operating System Environment Variables. Wrapping Up. Chapter 12 Accessing the Network. Data Exfiltration. Using UTL_TCP. Using UTL_HTTP. Using DNS Queries and UTL_INADDR. Encrypting Data Prior to Exfiltrating. Attacking Other Systems on the Network. Java and the Network. Database Links. Wrapping Up. Appendix A Default Usernames and Passwords. Index.
Copyright Date
2007
Topic
Security / General, Security / Networking
Lccn
2006-036733
Dewey Decimal
005.8
Intended Audience
Trade
Dewey Edition
22
Illustrated
Yes
Genre
Computers

賣家提供的物品說明

bookbox9150

bookbox9150

100% 正面信用評價
已賣出 339 件物品
通常在 24 小時內回覆

詳盡賣家評級

過去 12 個月的平均評級

說明準確
4.9
運費合理
5.0
運送速度
5.0
溝通
5.0

賣家信用評價 (131)

a***r (329)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Great experience. Fast shipping. A very nice book.
v***a (286)- 買家留下的信用評價。
過去 6 個月
購買已獲認證
Item as described, fast shipping.
c***s (829)- 買家留下的信用評價。
過去 6 個月
購買已獲認證
Excellent transaction in every way. Thank you!