The book will cover the how to break into and how to defend the most popular database server software. These include:
* Microsoft's SQL Server
* IBM's DB2
Each of these will be examined to show how hackers gain access using various methods from buffer overflow exploitation, privilege escalation through SQL, SQL injection and stored procedure and trigger abuse. Also discussed are those techniques that are specific to each database. With each attack topic presented, ways of preventing such abuse will be discussed.