The Database Hackers Handbook: Defending Database Servers

This chapter examined a number of ways in which DB2 can be compromised, ranging from exploiting buffer overflows to filesystem access. The next chapter looks at how to secure DB2.

Категории