Skip to Main Content
Implementing AWS: Design, Build, and Manage your Infrastructure
book

Implementing AWS: Design, Build, and Manage your Infrastructure

by Yohan Wadia, Rowan Udell, Lucas Chan, Udita Gupta
January 2019
Intermediate to advanced content levelIntermediate to advanced
690 pages
16h
English
Packt Publishing
Content preview from Implementing AWS: Design, Build, and Manage your Infrastructure

Working with SQL injection and cross-site scripting conditions

Besides restricting access to a specific set of IP addresses, WAF additionally provides defense capabilities against more exploitative attacks, such as SQL injections and cross-site scripting. In this section, we will take a closer look at both of these conditions and how you can leverage them for protecting your own applications.

To start off, let's have a closer look at SQL injections. An SQL injection basically consists of the insertion of an SQL query within a request that is made from a client to your application.

SQL injections, if successfully implemented, can read as well as modify sensitive data from the database, and are even capable enough to execute administration ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

AWS Account Setup Best Practices

AWS Account Setup Best Practices

Chad Smith
AWS Administration Cookbook

AWS Administration Cookbook

Rowan Udell, Lucas Chan

Publisher Resources

ISBN: 9781788835770OtherErrata Page