A Study on Common SQL Injection Attacks and Defenses - a Case of Discuz Software
碩士 === 國防大學 === 資訊管理學系 === 104 === Global network has developed more than ten years. A wide variety of websites have mushroomed birth to response to user demand for access to the Internet. Most people choose web packaged software to the operating site while free software is numerous. However, the de...
Main Authors: | Lee,Chun-Hsien, 李俊憲 |
---|---|
Other Authors: | Fu,Chen-Hua |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/ucaa6w |
Similar Items
-
Exploring Defense of SQL Injection Attack in Penetration Testing
by: Zhu, Yao Chu
Published: (2016) -
A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy
by: An-Na Lee, et al.
Published: (2011) -
A Defense against SQL Injection Attack through Validation on Input Legitimacy
by: Ching-Ju Wu, et al.
Published: (2009) -
TransSQL: A Translation and Validation-based Solution for SQL-Injection Attacks
by: Hao-lun Huang, et al.
Published: (2010) -
A Taxonomy of SQL Injection Defense Techniques
by: Aryal, Dhiraj, et al.
Published: (2011)