O'Reilly logo

Mastering MeteorJS Application Development by Jebin B V

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing database operations

It is needless to say how important it is to verify every piece of data before inserting or updating it in the database. From the beginning, it has been said, don't believe the inputs from the users. We have heard about SQL injection, XSS injections, and many more such kinds of attacks that succeed due to not verifying the data against the necessary validation logic.

Whenever there is access to a database-related operation without any abstraction layer, the developers must be very cautious about the data. It is better to write the database operation code, as if it is defensive to malicious inputs. In the case of SQL, rather than writing raw queries and executing them, it is good to use prepared statements, which will ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required