官术网_书友最值得收藏!

Summary

So, to sum this up, let's take a look at what we covered in this chapter. SQL works using relationships, and it accepts a wide range of commands. We've also seen that, in general, some of these can be abused by malicious attackers. For this reason, we should keep security in mind when designing and developing applications that rely on databases. This chapter gave you a taste of the main security issues and possible solutions.

The next chapter will focus on what a malicious attacker can do by taking advantage of SQL capabilities. We will provide examples of this, all while dealing with aspects related to non-relational databases.

This first chapter, despite being more abstract, is essential for focusing on the main concepts behind SQL injection. Of course, this just an introduction to what we are going to cover throughout this book, but with more concrete examples. Be sure to keep these topics in mind when dealing with the practical aspects of SQL injection.

Our journey into SQL injection has only just begun!

主站蜘蛛池模板: 九龙县| 连云港市| 鄂州市| 武安市| 大田县| 新余市| 津南区| 博湖县| 当雄县| 扶余县| 温宿县| 东乡县| 瓦房店市| 油尖旺区| 晋江市| 前郭尔| 苍溪县| 绩溪县| 石门县| 交口县| 咸宁市| 沧源| 克什克腾旗| 卢湾区| 资源县| 莱州市| 陆丰市| 汉阴县| 阿克苏市| 和林格尔县| 淳安县| 石台县| 诸城市| 德昌县| 棋牌| 焉耆| 安图县| 筠连县| 株洲县| 名山县| 宜兴市|