Cargando…
SQL Injection Defenses
This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages....
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
O'Reilly Media, Inc
2007
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1437926 |
_version_ | 1780924564607336448 |
---|---|
author | Nystrom, Martin |
author_facet | Nystrom, Martin |
author_sort | Nystrom, Martin |
collection | CERN |
description | This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. If the applications you build, manage, or guar |
id | cern-1437926 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2007 |
publisher | O'Reilly Media, Inc |
record_format | invenio |
spelling | cern-14379262021-04-22T00:32:21Zhttp://cds.cern.ch/record/1437926engNystrom, MartinSQL Injection DefensesComputing and Computers This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. If the applications you build, manage, or guarO'Reilly Media, Incoai:cds.cern.ch:14379262007 |
spellingShingle | Computing and Computers Nystrom, Martin SQL Injection Defenses |
title | SQL Injection Defenses |
title_full | SQL Injection Defenses |
title_fullStr | SQL Injection Defenses |
title_full_unstemmed | SQL Injection Defenses |
title_short | SQL Injection Defenses |
title_sort | sql injection defenses |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1437926 |
work_keys_str_mv | AT nystrommartin sqlinjectiondefenses |