Abstract
There are a lot of ways of backdooring a database. The earliest paper published on this, to my knowledge, was written by Pete Finnigan in 2001. You can find it at:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Paul Wright
About this chapter
Cite this chapter
Wright, P. (2014). Rootkit Checker and Security Monitoring. In: Protecting Oracle Database 12c. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6212-1_15
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6212-1_15
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6211-4
Online ISBN: 978-1-4302-6212-1
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)