SQL injection

Results: 397



#Item
231SQL injection / Computing / Data / Information / Security / OWASP / Cross-site request forgery

Agile and Secure Can we do both? OWASP Jerry Hoff

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:25
232Computer network security / Software testing / SQL / Data management / SQL injection / Web application security / Code injection / Penetration test / OWASP / Computer security / Cyberwarfare / Computing

One Click Ownage, Adventures of a lazy pen tester... Ferruh Mavituna Lead developer of netsparker

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:29
233Relational database management systems / Database management systems / Query languages / SQL / SQL injection / Microsoft SQL Server / Stored procedure / Insert / Select / Data management / Computing / Software

Advanced SQL injection to operating system full control Bernardo Damele Assumpção Guimarães [removed] April 10, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
234Null / GNU bison / SQL / Data Definition Language / /dev/null / Where / Join / Unique key / Order by / Data management / SQL keywords / Computing

Using Parse Tree Validation to Prevent SQL Injection Attacks Michele Spagnuolo Politecnico di Milano, Milan, Italy,

Add to Reading List

Source URL: miki.it

Language: English - Date: 2014-07-06 07:28:17
235

Buffer Overflow SQL Injection Conclusioni Esercizi Riferimenti

Add to Reading List

Source URL: tunnuz.net

Language: Italian - Date: 2014-09-12 00:58:21
    236World Wide Web / HTTP / Web development / XMLHttpRequest / Cross-site scripting / JSON / ASP.NET AJAX / SQL injection / HTTP cookie / Computing / Ajax / JavaScript

    Microsoft PowerPoint - DenimGroup_AJAXSecurityHereWeGoAgain_Content

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:50
    237Computer network security / Software testing / Hacking / OWASP / Vulnerability / SQL injection / Cross-site scripting / Code injection / Application firewall / Computer security / Cyberwarfare / Security

    HTTP Parameter Pollution Vulnerabilities in Web Applications Marco `embyte` Balduzzi Swiss Cyber Storm[removed]May 2011

    Add to Reading List

    Source URL: media.hacking-lab.com

    Language: English - Date: 2011-06-08 04:51:58
    238OWASP / Security / HTTP cookie / Password / SQL injection / Form / Computer security / Computing / Cyberwarfare

    http://jupiter-old.picbusiness.com/owasp/DISTRIBUTION.pic

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:10
    239Software testing / Computer network security / Hacking / Vulnerability / Cross-site scripting / SQL injection / SQL / Vulnerability management / Web application security scanner / Computer security / Cyberwarfare / Computing

    Anatomy of a Logic Flaw Presented by: David Byrne Managing Consultant [removed]

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2012-04-18 21:43:51
    240Data / Database management systems / SQL / SQL injection / JavaScript / Database / Microsoft SQL Server / Computing / Data management / Relational database management systems

    MBS Xojo (Real Studio) Web Starter Kit Version 1.1, © [removed]by Christian Schmitz, Monkeybread Software About the MBS Xojo (Real Studio) Web Starter Kit! 2

    Add to Reading List

    Source URL: www.monkeybreadsoftware.de

    Language: English - Date: 2013-10-01 07:38:04
    UPDATE