Ways to Protect Information System Against Technniques of SQL Injection
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F10%3A63509128" target="_blank" >RIV/70883521:28140/10:63509128 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Ways to Protect Information System Against Technniques of SQL Injection
Original language description
The article describes a technique called SQL injection, points to its principles and methods of its use in poorly secured information systems. The first part of the article focuses on the principles, characteristics and threats to SQL injection brings. The next section describes the methods of security and defence against SQL injection elements. The final section presents the tools for testing and identifying weak points and proposed solutions to increase the level of security information system.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
—
Continuities
S - Specificky vyzkum na vysokych skolach
Others
Publication year
2010
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Internet, bezpečnost a konkurenceschopnost organizací. Řízení procesů a využití moderních teerminálových technologií
ISBN
978-83-61645-16-0
ISSN
—
e-ISSN
—
Number of pages
5
Pages from-to
—
Publisher name
Univerzita Tomáše Bati ve Zlíně, Fakulta aplikované informatiky
Place of publication
Zlín
Event location
Zlín
Event date
Jan 1, 2010
Type of event by nationality
EUR - Evropská akce
UT code for WoS article
—