Please use this identifier to cite or link to this item:
https://idr.nitk.ac.in/jspui/handle/123456789/6624
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chandrashekhar, R. | - |
dc.contributor.author | Mardithaya, M. | - |
dc.contributor.author | Santhi Thilagam, P. | - |
dc.contributor.author | Saha, D. | - |
dc.date.accessioned | 2020-03-30T09:45:55Z | - |
dc.date.available | 2020-03-30T09:45:55Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, Vol.7135 LNCS, , pp.524-533 | en_US |
dc.identifier.uri | https://idr.nitk.ac.in/jspui/handle/123456789/6624 | - |
dc.description.abstract | SQL Injection Attacks have been around for over a decade and yet most web applications being deployed today are vulnerable to it. The bottom line is that the web has made it easy for new developers to develop web applications without concerning themselves with the security flaws, and that SQL Injection is thought to be a simple problem with a very simple remedy. To truly bring security to the masses, we propose a classification that not only enumerates but also categorizes the various attack methodologies, and also the testing frameworks and prevention mechanisms. We intend our classification to help understand the state of the art on both sides of the fields to lay the groundwork for all future work in this area. � 2012 Springer-Verlag. | en_US |
dc.title | SQL injection attack mechanisms and prevention techniques | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.