Securing Databases

Watch the first few minutes on us! If you'd like to watch the entire video and hundreds more like it, download code samples, and leave comments, log in or purchase a subscription.



Comments

You must log in to view comments.

Instructor

Ilya Pogrebensky

Description

Some of the most prolific hack attacks in recent years have targeted databases that store information insecurely or that are insecure themselves. In Part 3, Ilya introduces common attack vectors against databases as well as techniques for defending against them.

Table of Contents

{{toc.Position}} {{toc.Text}}

Related Links

  • {{link.LinkText}} (requires a paid subscription)

Series

This course is part of the following series: