Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

proper data protection

biblio

Visible to the public Testing Techniques and Analysis of SQL Injection Attacks

Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
  • SQL Injection vulnerability
  • resilience
  • Resiliency
  • security of data
  • security systems
  • security testing
  • sensitive data
  • sensitive information
  • SQL
  • SQL injection
  • SQL Injection attacks
  • SQL injection problems
  • relational databases
  • SQL query
  • testing techniques
  • three-tier-architecture
  • traditional security policies
  • user interfaces
  • users
  • Web application vulnerabilities
  • web applications
  • Web sites
  • website
  • handy interface
  • attackers
  • Cogeneration
  • commonly used Web application attacks
  • composability
  • Data protection
  • database-driven Web applications
  • DH-HEMTs
  • different security systems
  • effective data protection systems
  • good target
  • governmental organizations
  • attack
  • Human behavior
  • integrated circuits
  • internet
  • Knowledge engineering
  • Metrics
  • penetration testing technique
  • program testing
  • proper data protection
  • pubcrawl
  • relational database security

Terms of Use  |  ©2023. CPS-VO