SQL injection

Results: 397



#Item
1Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:41:20
2Basic SQL Injection Dany Find target ? ?

Basic SQL Injection Dany Find target ? ?

Add to Reading List

Source URL: www.chroot.org

Language: English - Date: 2004-10-04 13:27:20
    3Obfuscation-based Analysis of SQL Injection Attacks Raju Halder Dipartimento di Informatica Universit`a Ca’ Foscari di Venezia, Italy

    Obfuscation-based Analysis of SQL Injection Attacks Raju Halder Dipartimento di Informatica Universit`a Ca’ Foscari di Venezia, Italy

    Add to Reading List

    Source URL: www.dsi.unive.it

    - Date: 2010-07-14 03:44:58
      4Hack & Fix 
  Hands on ColdFusion Security Training Pete Freitag, Foundeo Inc. David Epler, AboutWeb LLC

      Hack & Fix 
 Hands on ColdFusion Security Training Pete Freitag, Foundeo Inc. David Epler, AboutWeb LLC

      Add to Reading List

      Source URL: www.petefreitag.com

      Language: English - Date: 2015-11-12 15:17:53
      5Database Backup and Recovery Strategy at OIR  Mingguang Xu  email:

      Database Backup and Recovery Strategy at OIR Mingguang Xu email:

      Add to Reading List

      Source URL: oir.uga.edu

      Language: English - Date: 2015-04-29 13:25:26
      6Microsoft PowerPoint - AnIntroductionToApplicationSecurityInJ2EEEnvironments_JavaMUG.ppt

      Microsoft PowerPoint - AnIntroductionToApplicationSecurityInJ2EEEnvironments_JavaMUG.ppt

      Add to Reading List

      Source URL: denimgroup.com

      Language: English - Date: 2014-01-13 18:16:27
      7A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis Petropoulos2, Hung Q. Ngo2 , and Shambhu Upadhyaya2 1

      A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis Petropoulos2, Hung Q. Ngo2 , and Shambhu Upadhyaya2 1

      Add to Reading List

      Source URL: www.cse.buffalo.edu

      Language: English - Date: 2010-07-20 10:35:48
      8PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

      PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

      Add to Reading List

      Source URL: www.prevoty.com

      Language: English - Date: 2016-08-18 22:09:36
      9        OWASP Top 10 Proactive Controls 2016 

            OWASP Top 10 Proactive Controls 2016 

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2016-01-25 17:05:07
      10Achieving Web Security by Increasing the Web Application Safety Maryam Abedi Navid Nikmehr  Mohsen Doroodchi

      Achieving Web Security by Increasing the Web Application Safety Maryam Abedi Navid Nikmehr Mohsen Doroodchi

      Add to Reading List

      Source URL: worldcomp-proceedings.com

      Language: English - Date: 2014-05-28 12:08:56