SQL Injection Attacks by Example
SQL Injection Attacks by Example covers both sides of the story: how hackers use unverified user input to break in and how to protect yourself against it. A good introduction, and a must read, if you are not familiar with SQL Injection Attacks.
Via [ISerializable]
No comments:
Post a Comment