Text
SQL Injection Attacks and Defense
-There are many ways to exploit SQL injection vulnerabilities to achieve a myriad of goals, the success of the attack is usually highly dependent on the underlying database and interconnected systems that are under attack.
1975416001 | 005.1-Jus-s | PERPUSTAKAAN SESKOAL (Rak 1 B Baris 6) | Tersedia |
No. Panggil | 005.1-Jus-s |
---|---|
Penerbit | Burlington: Syngress Publishing., 2009 |
Deskripsi Fisik | - |
Bahasa | English |
ISBN/ISSN | - |
Tipe Isi | Text |
Tipe Media | - |
Subjek | - |
This software program inculding any documentation and media (software) is protected by copyright laws and international treaty,
and is a proprietary product of INNOVDIGI SOLUTION. The use of this software is also governed by terms of the Software License Agreement on the reverse side (Agreement).
Number of license: