EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Page 26• SQL Server 2005o Step 1: Copy and attach the hidden resource databaseo Step 2: Login via Dedicated Administrator Connection (DAC)o Step 3: Alter the sys.server_principalsview Scripto Step 4: Introduce the Rootkit• Detecting SQL Server Rootkits• Rootkit Detection Toolo DB Audito ApexSQL Audito Audit DBo DbProtectModule 13: <strong>Secure</strong> Application Testing• Software Development Life Cycle (SDLC)• Introduction to Testing• Types of Testing• White Box Testing• Types of White Box Testing• Dynamic White-Box Testing• Integration Test• Regression Testing• System Testing• Black Box Testing• Load Testing• Strategies For Load Testing• Functional Testing• Testing Stepshttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>