Resource Guide

White Papers: How to protect against SQL injection and other application attacks

SQL injection is just one exploit that can be used against Web applications -- there are many lurking out there. Fortunately, there are steps you can take now to prevent SQL injection and other attacks on your applications. These two white papers describe such exploits and give advice for guarding against them.

    Requires Free Membership to View

  • SQL injection: Are your Web applications vulnerable?(PDF)
    SQL injection is a technique for exploiting Web applications that use client-supplied data in SQL queries without stripping potentially harmful characters first. Despite being remarkably simple to protect against, there is an astonishing number of production systems connected to the Internet that are vulnerable to this type of attack. The objective of this paper is to educate the professional security community on the techniques that can be used to take advantage of a Web application that is vulnerable to SQL injection, and to make clear the correct mechanisms that should be put in place to protect against SQL injection and input validation problems in general.
  • Security at the next level: Are your Web applications vulnerable?(PDF)
    Are your Web applications vulnerable? What techniques are hackers using to exploit Web-based applications, and how can you protect your site? This paper explains Web application security and includes a report on the top Web application vulnerabilities. It also discusses how your site might be open to threats such as SQL injection, parameter manipulation, common file query, cross-site scripting and cookie tampering.

This was first published in February 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: