Cargando…

SQL Injection Defenses

This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages....

Descripción completa

Detalles Bibliográficos
Autor principal: Nystrom, Martin
Lenguaje:eng
Publicado: O'Reilly Media, Inc 2007
Materias:
Acceso en línea:http://cds.cern.ch/record/1437926
_version_ 1780924564607336448
author Nystrom, Martin
author_facet Nystrom, Martin
author_sort Nystrom, Martin
collection CERN
description This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. If the applications you build, manage, or guar
id cern-1437926
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2007
publisher O'Reilly Media, Inc
record_format invenio
spelling cern-14379262021-04-22T00:32:21Zhttp://cds.cern.ch/record/1437926engNystrom, MartinSQL Injection DefensesComputing and Computers This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages. This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen. Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. If the applications you build, manage, or guarO'Reilly Media, Incoai:cds.cern.ch:14379262007
spellingShingle Computing and Computers
Nystrom, Martin
SQL Injection Defenses
title SQL Injection Defenses
title_full SQL Injection Defenses
title_fullStr SQL Injection Defenses
title_full_unstemmed SQL Injection Defenses
title_short SQL Injection Defenses
title_sort sql injection defenses
topic Computing and Computers
url http://cds.cern.ch/record/1437926
work_keys_str_mv AT nystrommartin sqlinjectiondefenses