SQL injection

Results: 397



#Item
151

Zaman Tabanlı SQL Injection Saldırıları Onur Yılmaz, Mayıs 2010, WGT E-Dergi 5. Sayı İster SQL Enjeksiyonu ister SQL Sokuşturması diyin isterseniz hiç umurunuzda bile olmasın ama SQL Injection saldırıları,

Add to Reading List

Source URL: webguvenligi.org

Language: Turkish - Date: 2011-08-03 19:49:45
    152Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

    An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:40
    153Computer network security / Software testing / Data management / SQL / SQL injection / Relational database management systems / Penetration test / Vulnerability / Web application security / Computing / Computer security / Cyberwarfare

    The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April[removed]Ponemon Institute© Research Report

    Add to Reading List

    Source URL: www.dbnetworks.com

    Language: English - Date: 2014-04-15 01:06:32
    154Password / Cryptography / SQL / MD5 / SQL injection / Salt / PostgreSQL / Cryptographic protocols / CRAM-MD5 / Computing / Computer security / Software

    Securing PostgreSQL From External Attack

    Add to Reading List

    Source URL: momjian.us

    Language: English - Date: 2014-12-06 10:08:45
    155Electronic commerce / Software testing / Payment systems / Computer network security / Hacking / SQL injection / SQL / Vulnerability / Payment Card Industry Data Security Standard / Computer security / Computing / Cyberwarfare

    The Visa Fraud Control group has seen increased number of exploits on ecommerce merchants

    Add to Reading List

    Source URL: www.visa-asia.com

    Language: English - Date: 2009-07-16 02:59:34
    156Computer network security / Computing / Application security / Application firewall / Penetration test / Web application security / Vulnerability / Cross-site scripting / SQL injection / Computer security / Cyberwarfare / Software testing

    Source Code Analysis Made Easy The Web AppSec How-to: The Defenders’ Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to dis

    Add to Reading List

    Source URL: www.checkmarx.com

    Language: English - Date: 2014-12-31 05:13:21
    157HTTP / Internet Information Services / Password / Integrated Windows Authentication / Basic access authentication / MSDE / Relational database management systems / SQL injection / Privileged password management / Software / Computing / Microsoft Windows

    Securing and Configuring Advanced Defect Tracking Web Edition Introduction Advanced Defect Tracking contains two levels of security that you should be concerned with: MSDE/SQL Server, and the configuration of Internet I

    Add to Reading List

    Source URL: www.borderwave.com

    Language: English - Date: 2004-03-31 17:04:56
    158Computer network security / Cross-platform software / Oracle Database / Oracle Corporation / Pete Finnigan / Buffer overflow / Computer security / SQL injection / Copyright law of the United States / Software / Computing / Cyberwarfare

    Oracle_Security_Masterclass_WH2008

    Add to Reading List

    Source URL: www.petefinnigan.com

    Language: English - Date: 2008-09-29 13:20:37
    159Data management / Computer network security / SQL / Netcat / Network management / Microsoft SQL Server / SQL injection / Penetration test / BackTrack / Computing / Software / Relational database management systems

    Fast-Track Advanced penetration techniques made easy… February 7, 2009 securestate

    Add to Reading List

    Source URL: www.shmoocon.org

    Language: English - Date: 2010-11-01 16:47:38
    160Computer security / Data security / Computer network security / Relational database management systems / Database management systems / SQL injection / Data breach / Information security / Malware / Computing / Security / Cyberwarfare

    Securing Information in The New Digital Economy

    Add to Reading List

    Source URL: www.oracle.com

    Language: English
    UPDATE