O'Reilly logo

Assessing Network Security by David LeBlanc, Kevin Lam, Ben Smith

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 18. Database Attacks

Have you ever received e-mail from someone you don’t know, advertising some product or gimmick you’ve never heard of? Ever wonder how on earth this person got your e-mail address? Well, your name and e-mail address are probably sitting on a database server somewhere with the names and e-mail addresses of millions of other people who are wondering the same thing. Database servers, however, can be used for a lot more useful things than sending unsolicited e-mail. For example, some organizations use database servers to store confidential information such as customer names, credit card numbers, and invoices, as well as employee salaries and social security numbers.

It’s ironic, however, that database servers tend to be ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required