This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages.
This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen.
Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. If the applications you build, manage, or guard are a path to sensitive data, you must protect your applications and their users from this growing threat.
Table of contents
SQL Injection Defenses
- SQL Injection Defenses
- Why Should You Care?
- How Applications Work
- Defense #1: Code Securely
- Defense #2: Monitor for Attacks
- Defense #3: Block Attacks
- Defense #4: Probe for Vulnerabilities
- Conclusion and Bottom Line
- About the Author
- Title: SQL Injection Defenses
- Release date: March 2007
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596529642
You might also like
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition
Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. …
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
Real-World Bug Hunting
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks …
Learning SQL, 3rd Edition
As data floods into your company, you need to put it to work right away—and SQL …