Please note that this site is historical. Since the closure of Digg as a voting platform, this site's data is not updated anymore.
4diggs

SQL for MySQL Developers: A Comprehensive Tutorial and Reference

The Most Complete and Practical Guide to MySQL Version 5’s Powerful SQL Dialect

MySQL version 5 offers a SQL dialect with immense power. In SQL for MySQL Developers, Rick F. van der Lans helps you master this version ofSQL and take advantage of its full potential. Using case study examplesand hands-on exercises, van der Lans illuminates every key concept,technique, and statement–including advanced features that make iteasier to create even the most complex statements and programs…

Submitted:May 29, 2007
Author:Rick F. van der Lans
Brand:Addison-Wesley Professional
Total comments:0
Category:SQL
4 diggs • 0 comments • May 29, 2007

The Most Complete and Practical Guide to MySQL Version 5’s Powerful SQL Dia

MySQL version 5 offers a SQL dialect with immense power. In SQL for MySQL Developers, Rick F. van der Lans helps you master this version ofSQL and take advantage of its full potential. Using case study examplesand hands-on exercises, van der Lans illuminates every key concept,technique, and statement–including advanced features that make ...

12diggs

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

—Halvar Flake, CEO and head of research, SABRE Security GmbH

The Definitive Insider’s Guide to Auditing Software Security

This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written…

Submitted:Jan 18, 2007
Author:Mark Dowd
Brand:Addison-Wesley Professional
Total comments:3
Category:Security+
12 diggs • 3 comments • Jan 18, 2007

New book on finding 0-day vulnerabilities

Three top security researchers have released a new book on analyzing software for security vulnerabilities. Unlike other books of this type, "The Art of Software Security Assessment" goes into unprecedented technical detail on methods for finding real world vulnerabilities. Rumor has it that the book also contains 0-day.

1