Tài liệu tham khảo |
Loại |
Chi tiết |
1. Dang, T.K., Truong, Q.C., Cu-Nguyen, P.H., Tran, T.Q.N.: An Extensible Framework for Detecting Database Security Flaws. In Proceedings of the International Workshop on Advance Computing and Applications 2008 (ACOMP), Ho Chi Minh City, Vietnam (2008) |
Sách, tạp chí |
Tiêu đề: |
An Extensible Framework for Detecting Database Security Flaws |
|
2. Dang, T.K., Tran, T.Q.N., Truong, Q.C.: Security Issues in Housing Service Outsourcing Model with Database Systems. ASIS LAB Technical Report, ASIS-TR-0026/2008, URL: http://www.cse.hcmut.edu.vn/~asis (2008) |
Sách, tạp chí |
Tiêu đề: |
Security Issues in Housing Service Outsourcing Model with Database Systems |
|
3. Dang, T.K., Tran, T.Q.N., Truong, Q.C.: Security Issues in Housing Service Outsourcing Model with Database Systems. ASIS LAB Technical Report, ASIS-TR-0017/2009, URL: http://www.cse.hcmut.edu.vn/~asis (2009) |
Sách, tạp chí |
Tiêu đề: |
Security Issues in Housing Service Outsourcing Model with Database Systems |
|
4. Dang, T.K., Tran, T.Q.N., Truong, Q.C., Nguyen TT: Security Issues in Housing Service Outsourcing Model with Database Systems. ASIS LABTechnical Report, ASIS-TR-0044/2010, URL |
Sách, tạp chí |
Tiêu đề: |
Security Issues in Housing Service Outsourcing Model with Database Systems |
|
5. Dang, T.K., Tran, T.Q.N.: Towards Side-Effects-free Database Penetration Testing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ISSN 2093-5374, Volume 1, Issue 1, June 2010, pp.72-85 |
Sách, tạp chí |
Tiêu đề: |
Towards Side-Effects-free Database Penetration Testing |
|
7. David, L.: The Oracle Hacker's Handbook: Hacking and Defending Oracle, Wiley Publishing, Inc (2007) |
Sách, tạp chí |
Tiêu đề: |
The Oracle Hacker's Handbook: Hacking and Defending Oracle, Wiley Publishing |
|
8. Wai, C. T.: Conducting a Penetration Test on an Organization. Retrieved from the SANS Institute Reading Room site (2002) |
Sách, tạp chí |
Tiêu đề: |
Conducting a Penetration Test on an Organization |
|
9. Klevinsky, T.J., Scott L., Ajay G.: Hack I.T. Security through Penetration, Addison-Wesley (2002) |
Sách, tạp chí |
Tiêu đề: |
Hack I.T. Security through Penetration |
|
10. Hossein, B.: Handbook of Information Security, Wiley Publishing (2005) |
Sách, tạp chí |
Tiêu đề: |
Handbook of Information Security |
|
11. Abhinav, S., Shamik, S., Majumdar, A.K.: Database Intrusion Detection using Weighted Sequence Mining. Journal of Computers, 1(4) (2006) |
Sách, tạp chí |
Tiêu đề: |
Database Intrusion Detection using Weighted Sequence Mining |
|
13. Daniel, G., John, H.: Penetration Testing: A Duet. In proceedings of Computer Security Applications Conference (2002) |
Sách, tạp chí |
Tiêu đề: |
Penetration Testing: A Duet |
|
14. Natan, R.B.: How to Secure and Audit Oracle 10g, 11g, Auerbach Publications (2009) |
Sách, tạp chí |
Tiêu đề: |
How to Secure and Audit Oracle 10g, 11g |
|
15. NRL Technical Memorandum: Handbook for the Computer Security Certification of Trusted Systems, chapter 10 (1995) |
Sách, tạp chí |
Tiêu đề: |
Handbook for the Computer Security Certification of Trusted Systems |
|
16. Federal Office for Information Security (BSI): Study: A Penetration Testing Model, https://ssl.bsi.bund.de/english/publications/studies/penetration.pdf(2003) |
Sách, tạp chí |
Tiêu đề: |
Study: A Penetration Testing Model |
|
26. Oracle Users Group presentation on Effective Database Security, URL: http://www.nyoug.org/Presentations/2007/200706_Soen_Top%2010%20Database%20Attacks.pdf |
Link |
|
30. MySQL Create Database Bypass and Privilege Escalation, URL: http://secunia.com/advisories/21506/asesecurity.com |
Link |
|
31. Amichai S.: Listing of the top 10 database attacks, Imperva, URL: http://www.bcs.org/server.php?show=ConWebDoc.8852 |
Link |
|
32. Three well-known security websites: http://www.red-database-security.com, http://www.petefinnigan.com, http://www.securityfocus.com |
Link |
|
33. Four well-known database testing tools: http://www.imperva.com, http://ww.ngssoftware.com, http://www.nessus.org, http://www.greensql.com |
Link |
|
37. Incident Response and Security. URL: http://www.first.org/cvss/cvss-guide.html (2011) |
Link |
|