Chapter 6: Putting It All Together

Here we are, finally, at the end of our journey of going through the secrets of SQL injection. By now, you have experienced what SQL injection is, what it implies in the context of an application or a more complex system, what consequences can be brought to security in case of such an oversight, and what countermeasures can be taken in order to mitigate or totally prevent its effects from happening.

This final chapter serves as an overall review of what you learned by reading this book. It will do this by summarizing and analyzing what we've seen in brief, hoping to put everything into a critical perspective while also considering the broader implications not only of SQL injection, but also security vulnerabilities ...

Get SQL Injection Strategies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.