This Short Cut introduces you to how SQL injection vulnerabilities work, what makes applications vulnerable, and how to protect them. It helps you find your vulnerabilities with analysis and testing tools and describes simple approaches for fixing them in the most popular web-programming languages.
This Short Cut also helps you protect your live applications by describing how to monitor for and block attacks before your data is stolen.
Hacking is an increasingly criminal enterprise, and web applications are an attractive path to identity theft. If the applications you build, manage, or guard are a path to sensitive data, you must protect your applications and their users from this growing threat.
Table of contents
SQL Injection Defenses
- SQL Injection Defenses
- Why Should You Care?
- How Applications Work
- Defense #1: Code Securely
- Defense #2: Monitor for Attacks
- Defense #3: Block Attacks
- Defense #4: Probe for Vulnerabilities
- Conclusion and Bottom Line
- About the Author
- Title: SQL Injection Defenses
- Release date: March 2007
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596529642
You might also like
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition
Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. …
Python for Data Analysis, 2nd Edition
Get complete instructions for manipulating, processing, cleaning, and crunching datasets in Python. Updated for Python 3.6, …
Node.js - The Complete Guide
Node.js is one of the most popular and modern server-side programming languages and is used widely …
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 3rd Edition
Through a recent series of breakthroughs, deep learning has boosted the entire field of machine learning. …