SQL injection

Results: 397



#Item
1Data management / Computing / Software / Relational database management systems / Cross-platform software / MySQL / Weka / SQL injection / Database server / Database / Application server / Code injection

Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:41:20
2

Basic SQL Injection Dany Find target ? ?

Add to Reading List

Source URL: www.chroot.org

Language: English - Date: 2004-10-04 13:27:20
    3

    Obfuscation-based Analysis of SQL Injection Attacks Raju Halder Dipartimento di Informatica Universit`a Ca’ Foscari di Venezia, Italy

    Add to Reading List

    Source URL: www.dsi.unive.it

    - Date: 2010-07-14 03:44:58
      4Software / Computing / Computer security / Web development software / Computer network security / Adobe software / Adobe ColdFusion / System administration / OWASP / SQL injection / Zap / Sudo

      Hack & Fix 
 Hands on ColdFusion Security Training Pete Freitag, Foundeo Inc. David Epler, AboutWeb LLC

      Add to Reading List

      Source URL: www.petefreitag.com

      Language: English - Date: 2015-11-12 15:17:53
      5Data management / Software / SQL keywords / Computing / Null / Join / Oracle Database / From / SQL / PL/SQL / SQL injection

      Database Backup and Recovery Strategy at OIR Mingguang Xu email:

      Add to Reading List

      Source URL: oir.uga.edu

      Language: English - Date: 2015-04-29 13:25:26
      6Computing / Computer security / Cyberwarfare / Hacking / Data management / Software architecture / Software testing / SQL / SQL injection / Foundstone / OWASP / Vulnerability

      Microsoft PowerPoint - AnIntroductionToApplicationSecurityInJ2EEEnvironments_JavaMUG.ppt

      Add to Reading List

      Source URL: denimgroup.com

      Language: English - Date: 2014-01-13 18:16:27
      7Data management / Computing / Information retrieval / SQL / Database theory / Database management systems / Relational database / Join / Database / Hierarchical and recursive queries in SQL / SQL injection / Data integration

      A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis Petropoulos2, Hung Q. Ngo2 , and Shambhu Upadhyaya2 1

      Add to Reading List

      Source URL: www.cse.buffalo.edu

      Language: English - Date: 2010-07-20 10:35:48
      8Computing / Cyberwarfare / Computer security / Computer network security / Cross-site scripting / Hacking / Cross-site request forgery / JavaScript / SQL injection / Application security / Web application firewall

      PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

      Add to Reading List

      Source URL: www.prevoty.com

      Language: English - Date: 2016-08-18 22:09:36
      9Computing / Computer security / Cyberwarfare / Computer network security / Cross-site scripting / OWASP / SQL injection / Web application security / Code injection / JavaScript / Character encodings in HTML / HTTP header injection

            OWASP Top 10 Proactive Controls 2016 

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2016-01-25 17:05:07
      10Computing / Cyberwarfare / Computer security / Computer network security / SQL / Hacking / Software testing / Web applications / SQL injection / Vulnerability / Web application security / Code injection

      Achieving Web Security by Increasing the Web Application Safety Maryam Abedi Navid Nikmehr Mohsen Doroodchi

      Add to Reading List

      Source URL: worldcomp-proceedings.com

      Language: English - Date: 2014-05-28 12:08:56
      UPDATE