Watch Now Free registration required
In this webcast, the presenters say about example of database privilege abuse relates to direct database attacks without Web applications. A malicious insider can decompile a fat desktop Java client to glean credential information allowing him to directly access the database with elevated privileges.
- Format: Webcast
- Size: 0 KB