3 von 3 Kunden fanden die folgende Rezension hilfreich
Having read about this book at various places, I thought it might be a fruitful addition to my library on hacking literature, especially regarding databases, not least only due to the list of authors. The first chapter is nicely written and somehow informative, however, as soon as the authors start writing on specific database implementations, the book becomes more or less a tribute to themselves. Not only that each chapter is far too short, and does not really contains anything new, further issues are...
1. describing a database within no more than 10 pages is futile...
2. listing already known attacks is nothing new to be published...we have sources for that
3. it's nice… Mehr dazu