11.07.2015 Views

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Page 26• SQL Server 2005o Step 1: Copy and attach the hidden resource databaseo Step 2: Login via Dedicated Administrator Connection (DAC)o Step 3: Alter the sys.server_principalsview Scripto Step 4: Introduce the Rootkit• Detecting SQL Server Rootkits• Rootkit Detection Toolo DB Audito ApexSQL Audito Audit DBo DbProtectModule 13: <strong>Secure</strong> Application Testing• Software Development Life Cycle (SDLC)• Introduction to Testing• Types of Testing• White Box Testing• Types of White Box Testing• Dynamic White-Box Testing• Integration Test• Regression Testing• System Testing• Black Box Testing• Load Testing• Strategies For Load Testing• Functional Testing• Testing Stepshttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!