<--- Back to Details
First PageDocument Content
Computer network security / Software testing / Data management / SQL / SQL injection / Vulnerability / Code injection / Email injection / Acunetix / Computer security / Cyberwarfare / Computing
Date: 2014-10-01 07:15:40
Computer network security
Software testing
Data management
SQL
SQL injection
Vulnerability
Code injection
Email injection
Acunetix
Computer security
Cyberwarfare
Computing

Finding the right web application scanner

Add to Reading List

Source URL: www.acunetix.com

Download Document from Source Website

File Size: 150,94 KB

Share Document on Facebook

Similar Documents

Data management / Relational database management systems / Computing / Information retrieval / SUSE Linux / SUSE / SQL Server / Adaptive Server Enterprise / SQL Server Express / SQL Server Compact

RUN SQL SERVER 2017 ON S U S E L I N U X E N T E R P RI S E S E R V E R Achieve industry-leading performance on the platform you trust Microsoft SQL Server 2017

DocID: 1xVxr - View Document

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases Yupeng Zhang∗ , Daniel Genkin†,∗ , Jonathan Katz∗ , Dimitrios Papadopoulos‡,∗ and Charalampos Papamanthou∗ ∗ University † Univers

DocID: 1xVtB - View Document

Data management / Information retrieval / Computing / SQL keywords / SQL / Query languages / Database management systems / Database theory / Select / Null / Update / Join

Automatically Synthesizing SQL Queries from Input-Output Examples Sai Zhang Yuyin Sun

DocID: 1xVm6 - View Document

Select

Synthesizing Highly Expressive SQL Queries From Input-Output Examples http://scythe.cs.washington.edu Chenglong Wang, Alvin Cheung, Ras Bodík University of Washington

DocID: 1xUu7 - View Document

Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries Shumo Chu, Brendan Murphy, Jared Roesch, Alvin Cheung, Dan Suciu Paul G. Allen School of Computer Science and Engineering University

DocID: 1xUqU - View Document