SQL injection attacks and defense
Wedi'i Gadw mewn:
| Prif Awdur: | |
|---|---|
| Awdur Corfforaethol: | |
| Fformat: | Electronig eLyfr |
| Iaith: | Saesneg |
| Cyhoeddwyd: |
Waltham, Mass. :
Elsevier,
2012.
|
| Rhifyn: | 2nd ed. |
| Pynciau: | |
| Mynediad Ar-lein: | An electronic book accessible through the World Wide Web; click to view |
| Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
Tabl Cynhwysion:
- What is SQL injection?
- Testing for SQL injection
- Reviewing code for SQL injection
- Exploiting SQL injection
- Blind SQL injection exploitation
- Exploiting the operating system
- Advanced topics
- Code-level defenses
- Platform level defenses
- Confirming and recovering from SQL injection attacks.