SQL injection

Results: 397



#Item
141Computer network security / Software testing / Risk / Market research / Vulnerability / Cross-site scripting / Penetration test / Survey methodology / SQL injection / Cyberwarfare / Computer security / Security

Effort Estimates on Web Application Vulnerability Discovery

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2012-12-08 23:54:39
142McAfee / Computer network security / Companies listed on the New York Stock Exchange / Password / Database security / SQL injection / Vulnerability / Oracle Corporation / Oracle Database / Computer security / Cyberwarfare / Security

Data Sheet McAfee Vulnerability Manager for Databases A comprehensive assessment of the risk to your most sensitive data You store your most valuable and sensitive data in a database, but most vulnerability

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:28
143Computer network security / Software testing / Cross-site scripting / Hacking / Cross-site request forgery / Vulnerability / Code injection / Penetration test / SQL injection / Computer security / Cyberwarfare / Computing

Damn Vulnerable Web App Ryan Dewhurst, Aralık 2009, WGT E-Dergi 3. Sayı I wanted an application developed in PHP/MySQL that was vulnerable to the most common types of web application vulnerabilities, that I could pract

Add to Reading List

Source URL: webguvenligi.org

Language: English - Date: 2011-08-03 19:42:25
144Data / Computing / SQL injection / Prepared statement / Where / Insert / From / Update / Select / Data management / SQL keywords / SQL

Extracted from: SQL Antipatterns Avoiding the Pitfalls of Database Programming This PDF file contains pages extracted from SQL Antipatterns, published by the

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2012-03-27 13:04:22
145SQL / SQL injection / Port scanner / Computing / Transmission Control Protocol / Computer network security / Microsoft SQL Server / Microsoft Data Access Components / Computer security / Cyberwarfare / Data management

M$SQL Sql Injection Thinking DM Wang[removed]Chroot Meeting

Add to Reading List

Source URL: www.chroot.org

Language: English - Date: 2004-10-16 13:51:12
146Cross-platform software / Scripting languages / Computer network security / Software testing / Cross-site scripting / PHP programming language / Code injection / SQL injection / Vulnerability / Computing / Cyberwarfare / Computer security

Journal of Computer Security[removed]–907 DOI[removed]JCS[removed]IOS Press 861

Add to Reading List

Source URL: iseclab.org

Language: English - Date: 2010-09-29 15:20:37
147Computer network security / Cross-site scripting / Cross-site request forgery / JavaScript / Rapid7 / Instructure / Penetration test / Resolution / SQL injection / Computer security / Computing / Software

CANVAS by Instructure Bugcrowd Flex Program Results December 2014 Executive Summary Bugcrowd Inc was engaged by Instructure to perform a Flex Bounty program, commonly known

Add to Reading List

Source URL: www.canvaslms.com

Language: English - Date: 2015-04-14 16:58:35
148Database management systems / Computer languages / Data management / Scripting languages / Monica S. Lam / SQL / Code injection / Cross-site scripting / Java / Computing / Software engineering / Cross-platform software

Securing Web Applications with Static and Dynamic Information Flow Tracking Monica S. Lam Michael Martin

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2007-12-15 19:41:29
149Software engineering / SQL / SQL injection / Code injection / XQuery / JavaScript / Scannerless parsing / XPath / Computing / Data management / Query languages

Delft University of Technology Software Engineering Research Group Technical Report Series Preventing Injection Attacks with Syntax Embeddings

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2007-02-05 11:40:47
150Computing / Application firewall / Imperva / Firewall / SQL injection / Denial-of-service attack / Incapsula / Computer network security / Computer security / Cyberwarfare

shutterstock_108036545no_text.eps

Add to Reading List

Source URL: www.inetu.net

Language: English - Date: 2014-12-17 16:05:50
UPDATE