Over the SQL injection hacking method
CIT'09 Proceedings of the 3rd International Conference on Communications and information technology
One approach to the testing of security of proposed database application software
Proceedings of the 15th WSEAS international conference on Computers
On automatic detection of SQL injection attacks by the feature extraction of the single character
Proceedings of the 4th international conference on Security of information and networks
Eliminating SQL injection and cross site scripting using aspect oriented programming
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Securing business processes using security risk-oriented patterns
Computer Standards & Interfaces
Hi-index | 0.00 |
SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the central known information about these attacks and significant insight from its contributing team of SQL injection experts. * Only book to provide a complete understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures * Covers unique, publicly unavailable SQL injection information by technical experts in such areas as Oracle and Microsoft SQL Server * Written by an established expert, author, and speaker in the field, with contributions from a team of equally renowned creators of SQL injection tools, applications, and educational materials