Chapter 1: Why Care About Database Security?
Chapter 2: The Oracle Architecture.
Chapter 3: Attacking Oracle.
Chapter 4: Oracle: Moving Further into the Network.
Chapter 5: Securing Oracle.
Chapter 6: IBM DB2 Universal Database.
Chapter 7: DB2: Discovery, Attack, and Defense.
Chapter 8: Attacking DB2.
Chapter 9: Securing DB2.
Chapter 10: The Informix Architecture.
Chapter 11: Informix: Discovery, Attack, and Defense.
Chapter 12: Securing Informix.
Chapter 13: Sybase Architecture.
Chapter 14: Sybase: Discovery, Attack, and Defense.
Chapter 15: Sybase: Moving Further into the Network.
Chapter 16: Securing Sybase.
Chapter 17: MySQL Architecture.
Chapter 18: MySQL: Discovery, Attack, and Defense.
Chapter 19: MySQL: Moving Further into the Network.
Chapter 20: Securing MySQL.
Chapter 21: Microsoft SQL Server Architecture.
Chapter 22: SQL Server: Exploitation, Attack, and Defense.
Chapter 23: Securing SQL Server.
Chapter 24: The PostgreSQL Architecture.
Chapter 25: PostgreSQL: Discovery and Attack.
Chapter 26: Securing PostgreSQL.
Appendix A: Example C Code for a Time-Delay SQL Injection Harness.
Appendix B: Dangerous Extended Stored Procedures.
Appendix C: Oracle Default Usernames and Passwords.