SQL Injection Strategies | Packt | Courses | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

SQL Injection Strategies | Packt

SQL Injection Strategies | Packt

LV
1
 

gcliffe07

Member
Joined
Dec 4, 2023
Threads
10
Likes
15
Awards
4
Credits
3,489©
Cash
0$
1702022473169

SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, ...



Code:
Section 1: (No)SQL Injection in Theory

Chapter 1: Structured Query Language for SQL Injection

Technical requirements
An overview of SQL – a relational query language
The syntax and logic of SQL
Security implications of SQL
Weaknesses in the use of SQL
SQL for SQL injection – a recap
Summary
Questions

Chapter 2: Manipulating SQL – Exploiting SQL Injection

Section 2: SQL Injection in Practice

Chapter 3: Setting Up the Environment

Chapter 4: Attacking Web, Mobile, and IoT Applications

Chapter 5: Preventing SQL Injection with Defensive Solutions

Chapter 6: Putting It All Together
Assessments


DOWNLOAD
 
LV
1
 

Ghost001

Member
Joined
Nov 11, 2023
Threads
24
Likes
21
Awards
4
Credits
4,061©
Cash
0$
View attachment 158359
SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, ...



Code:
Section 1: (No)SQL Injection in Theory

Chapter 1: Structured Query Language for SQL Injection

Technical requirements
An overview of SQL – a relational query language
The syntax and logic of SQL
Security implications of SQL
Weaknesses in the use of SQL
SQL for SQL injection – a recap
Summary
Questions

Chapter 2: Manipulating SQL – Exploiting SQL Injection

Section 2: SQL Injection in Practice

Chapter 3: Setting Up the Environment

Chapter 4: Attacking Web, Mobile, and IoT Applications

Chapter 5: Preventing SQL Injection with Defensive Solutions

Chapter 6: Putting It All Together
Assessments


DOWNLOAD
*** Hidden text: cannot be quoted. ***
unlock
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Tips

Similar threads

Top Bottom