Watch the first few minutes on us! If you'd like to watch the entire video and hundreds more like it, download code samples, access offline videos and skills assessments, and use the discussion forums, log in or purchase a subscription.
Some of the most prolific hack attacks in recent years have targeted databases that store information insecurely or that are insecure themselves. In Part 3, Ilya introduces common attack vectors against databases as well as techniques for defending against them.
{{toc.Position}} | {{toc.Text}} |