SQL injection

Results: 397



#Item
21SQL / Data management / SQL injection / Application server / Web application security / PL/SQL

Findings Security Errors in Java Applications Using Lightweight Static Analysis V. Benjamin Livshits Computer Systems Laboratory Stanford University Stanford, CA 94305

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2004-09-23 20:31:47
22Computer security / Computer network security / Cyberwarfare / Cryptography / National security / Threat / STRIDE / Attack / SQL injection / Denial-of-service attack

Microsoft PowerPoint - DenimGroup_SecondMostSecureDatabase_Content.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:14
23Computer network security / Hacking / Computer security / Web applications / Web application security / SQL injection / Vulnerability / Cross-site scripting / Application security / OWASP / HDIV / Web application firewall

Microsoft PowerPoint - DenimGroup_TurningThe Battleship_HowToBuildSecureSoftwareInLargeOrganizations_Content.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:31
24Query languages / Functional languages / Web programming / SQL / Domain-specific language / Cross-site scripting / Language Integrated Query / Code injection / JavaScript / SQL injection / Embedded SQL

Advances in Programming Languages APL17: Using SQL from Java Ian Stark School of Informatics The University of Edinburgh

Add to Reading List

Source URL: www.inf.ed.ac.uk

Language: English - Date: 2010-03-07 23:15:38
25Computer security / Computer network security / Threat model / SQL injection / Web application security / Attack / Server / Threat / Database / HDIV / Cross-site scripting

Microsoft PowerPoint - OWASP_SanAntonio_February2006_SecondMostSecureDatabase.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:30:26
26SQL keywords / SQL / Select / Insert / Order by / Where / From / Join / Condition / Update / Database / SQL injection

Appendix B SQL Reference SQL stands for Structured Query Language, this is a standard language used to communicate with a variety of different database formats. SQL can be used in iNETstore to display any data that you h

Add to Reading List

Source URL: support.inetstore.com

Language: English - Date: 2003-03-30 09:16:01
27Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security

REPORT DOCUMENTATION PAGE

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
28Relational database management systems / SQL / View / Oracle Database / Adaptive Server Enterprise / Database / Select / Sybase / SQL injection / Stored procedure

C HA PT E R 1 5 SQL Database Address Book OVERVIEW So far, the chapters in this part of the book have explained how to interface various ASCII text file–based databases on the Web. This provides a useful service, becau

Add to Reading List

Source URL: www.extropia.com

Language: English - Date: 2003-08-09 07:16:21
29Data management / SQL / NoSQL / Structured storage / SQL injection / Password / Database

NO SQL! NO INJECTION? A talk on the state of NoSQL security IBM Cyber Security Center of Excellence IBM AppScan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-26 10:25:56
30Cross-platform software / Data management / SQL / Relational database management systems / Transaction processing / SQL injection / Cross-site scripting / Column / JavaScript / Effi / Cross-site request forgery / Database trigger

Intrusion Recovery for Database-backed Web Applications Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, and Nickolai Zeldovich MIT CSAIL A BSTRACT

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-20 03:36:51
UPDATE