SQL injection attacks and defense
Wedi'i Gadw mewn:
Prif Awdur: | |
---|---|
Awdur Corfforaethol: | |
Fformat: | Electronig eLyfr |
Iaith: | Saesneg |
Cyhoeddwyd: |
Waltham, Mass. :
Elsevier,
2012.
|
Rhifyn: | 2nd ed. |
Pynciau: | |
Mynediad Ar-lein: | An electronic book accessible through the World Wide Web; click to view |
Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
Tabl Cynhwysion:
- What is SQL injection?
- Testing for SQL injection
- Reviewing code for SQL injection
- Exploiting SQL injection
- Blind SQL injection exploitation
- Exploiting the operating system
- Advanced topics
- Code-level defenses
- Platform level defenses
- Confirming and recovering from SQL injection attacks.