Anley, 2004 - Google Patents
Hackproofing MySQLAnley, 2004
View PDF- Document ID
- 4357725343728696680
- Author
- Anley C
- Publication year
- Publication venue
- An NGSSoftware Insight Security Research (NISR) Publication
External Links
Snippet
MySQL claims to be the world's most popular open source database, and with good reason. It is free, runs on a wide variety of platforms, is relatively simple, easy to configure and performs well even under significant load. By comparison to some other popular database …
- 238000011068 load 0 abstract description 16
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5941872B2 (en) | Systems and methods for authentication, data transfer and phishing protection | |
EP3430557B1 (en) | System and method for reverse command shell detection | |
Parampalli et al. | A practical mimicry attack against powerful system-call monitors | |
US10552603B2 (en) | Malicious mobile code runtime monitoring system and methods | |
US8474032B2 (en) | Firewall+ storage apparatus, method and system | |
EP2748751B1 (en) | System and method for day-zero authentication of activex controls | |
US7512977B2 (en) | Intrustion protection system utilizing layers | |
Chien et al. | Blended attacks exploits, vulnerabilities and buffer-overflow techniques in computer viruses | |
US12406060B2 (en) | Automated interpreted application control for workloads | |
US20110119484A1 (en) | Systems and Methods for Securely Providing and/or Accessing Information | |
Sharif | Web attacks analysis and mitigation techniques | |
Onarlioglu et al. | Sentinel: Securing legacy firefox extensions | |
US12050681B2 (en) | Software build system protection engine | |
Krishnamurthy et al. | Fine-grained privilege separation for web applications | |
US11409878B2 (en) | Trusted sequence for computing devices via hashes | |
Guimarães | Advanced SQL injection to operating system full control | |
AU2014200698B2 (en) | A computer-implemented method for detecting domain injection or evasion | |
Safford et al. | A trusted linux client (tlc) | |
Anley | Hackproofing MySQL | |
Catuogno et al. | A format-independent architecture for run-time integrity checking of executable code | |
Liu et al. | A trusted integrity measurement architecture for securing enterprise network | |
Mustafa et al. | Oracle Database Threats | |
Desimone | Windows credential theft: Methods and mitigations | |
WO2001061473A1 (en) | Computer security using dual functional security contexts | |
Singaravelu et al. | Enforcing configurable trust in client-side software stacks by splitting information flow |