SQL injection

Results: 397



#Item
11Software / Computing / Free software / Blog software / Content management systems / WordPress / Cross-site scripting / PHP / Website / Informing science / Movable Type / SQL injection

Informing Faculty Case Template

Add to Reading List

Source URL: pubs.mumacasereview.org

Language: English - Date: 2016-01-26 09:44:03
12Computer security / Cyberwarfare / Cybercrime / Hacking / Cross-site scripting / Hypertext Transfer Protocol / SQL injection / Code injection / Cross-site request forgery / Vulnerability / Full disclosure / HTTP cookie

VoidSec Advisory 2016

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-13 11:30:11
13Data management / Computing / Data / Database theory / Database / Relational database / SQL / Data warehousing / Relational database management systems / PL/SQL / SQL injection

Object-Oriented Development in a Relational World: Applying DeKlarit Chris Sells and Chris Tavares The relational database (RDBMS) has earned its place as a key part of our modern technological society. The RDBMS is an e

Add to Reading List

Source URL: sellsbrothers.com

Language: English - Date: 2015-08-22 14:30:08
14Cyberwarfare / Computer security / Computing / Hacking / Computer network security / Cryptography / National security / Cross-site request forgery / Oscar / SQL injection / Cross-site scripting / Application security

oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
15Cyberwarfare / Computer security / Computing / Computer network security / Threat model / Hacking / Software testing / Threat / STRIDE / Vulnerability / SQL injection / Security

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:19
16Security / Computing / Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Cross-site request forgery / Vulnerability / Information security / SQL injection

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
17Data modeling / SQL / Data management / Oracle Database / Join / Data dictionary / Unique key / Hierarchical and recursive queries in SQL / SQL injection / Null

A Beginner’s Guide to PowerSchool and North Carolina Data A Beginner’s Guide to

Add to Reading List

Source URL: www.nc-sis.org

Language: English - Date: 2016-02-08 17:30:27
18Ajax / JavaScript / Web development / Hypertext Transfer Protocol / XMLHttpRequest / JSON / Cross-site scripting / HTTP cookie / ASP.NET AJAX / Web application / SQL injection / Cross-site request forgery

Microsoft PowerPoint - DenimGroup_AJAXSecurityHereWeGoAgain_Content

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:53
19Hacking / Software testing / BitLocker / Disk encryption / Windows Server / Windows Vista / Code injection / Cross-site scripting / SQL injection / Buffer overflow / Transmission Control Protocol / Vulnerability

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
20Relational database management systems / SQL Server Reporting Services / Microsoft Access / Database / SQL Server Pro / SQL injection / CloverETL

William C. Eberle wcePublishing.com Author, Photographer, Artist, Sculptor, Editor, and Publisher Game, Entertainment, and Educational Product Designer, Architect, and Programmer

Add to Reading List

Source URL: wcepublishing.com

Language: English - Date: 2014-05-19 21:42:23
UPDATE