SQL injection

Results: 397



#Item
311Relational database management systems / Data / SQL / Database management systems / SQL injection / Null / Select / IBM DB2 / Database trigger / Data management / SQL keywords / Computing

https___3043416018965616284-a-google-com-s-sites.googlegroups.com_a_google.com_hr-advertising-and-operations_11.red_yogaball8.5x11.pdf?attachauth=ANoY7cpmyjR8SeexF7QEBeY_FUQR4mUmnmQVg47xlFjkFGfKqr_VD7rTtqaggvYmnzFiKP6_H6

Add to Reading List

Source URL: magazine.hackinthebox.org

Language: English - Date: 2014-01-06 00:09:47
312Hacking / Data management / SQL / SQL injection / Password / Relational database management systems / Web server / Vulnerability / Microsoft SQL Server / Computing / Cyberwarfare / Computer security

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS Acknowledgements • Ed Barlow

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2004-05-31 05:28:12
313Theoretical computer science / SQL injection / SQL / Hampi / Context-free grammar / String / Constraint programming / Boolean satisfiability problem / Formal grammar / Formal languages / Computing / Software engineering

HAMPI: A Solver for Word Equations over Strings, Regular Expressions, and Context-Free Grammars ADAM KIEZUN, Brigham and Women’s Hospital / Harvard Medical School VIJAY GANESH, Massachusetts Institute of Technology SHA

Add to Reading List

Source URL: www.pgbovine.net

Language: English - Date: 2014-01-03 23:24:44
314Software testing / Cross-platform software / Scripting languages / Hacking / Cross-site scripting / SQL injection / JavaScript / PHP / Attack patterns / Computing / Cyberwarfare / Computer security

Automatic Creation of SQL Injection and Cross-Site Scripting Attacks Adam Kie˙zun Philip J. Guo Karthick Jayaraman

Add to Reading List

Source URL: www.pgbovine.net

Language: English - Date: 2014-01-03 23:24:43
315Computer programming / Compiler construction / Programming paradigms / Data management / SQL / SQL injection / Context-free grammar / Parsing / Concolic testing / Computing / Formal languages / Software engineering

HAMPI: A Solver for String Constraints Adam Kie˙zun Vijay Ganesh [removed]

Add to Reading List

Source URL: www.pgbovine.net

Language: English - Date: 2014-01-03 23:24:44
316Relational database management systems / Software / Computer languages / Database / Database theory / SQL / SQL injection / Database activity monitoring / Database management systems / Data management / Computing

PDF Document

Add to Reading List

Source URL: www.world-exchanges.org

Language: English - Date: 2012-08-09 13:34:11
317Malware / Software testing / Microsoft Windows / Computer network security / DLL injection / Code injection / Vulnerability / SQL injection / Dynamic-link library / Cyberwarfare / Computing / Computer security

Trace: Tennessee Research and Creative Exchange Masters Theses University of Tennessee 

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-08-19 15:52:37
318Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
319Computer network security / Security / Web application security / Software testing / OWASP / HTTP response splitting / Application security / SQL injection / Cross-site scripting / Computer security / Cyberwarfare / Computing

OWASP to WASC to CWE Mapping Correlating Different Industry Taxonomy Jesper Jurcenoks Director, Research Chief Evangelist

Add to Reading List

Source URL: www.criticalwatch.com

Language: English - Date: 2013-07-10 13:17:08
320Data / Relational database management systems / Database management systems / SQL injection / Stored procedure / Null / Prepared statement / Insert / Select / Data management / Computing / SQL

Web-based Attack: SQL Injection        

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2013-01-31 09:35:28
UPDATE