- SQL Injection Strategies
- Ettore Galluccio Edoardo Caselli Gabriele Lombari
- 43字
- 2021-06-18 18:34:28
Technical requirements
For this chapter, we recommend that you are familiar with SQL and its main commands. If you have not already done so, we suggest reading the SQL technical documentation from the previous chapter, available at the following links:
推薦閱讀
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- Metasploit Penetration Testing Cookbook(Second Edition)
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 特種木馬防御與檢測(cè)技術(shù)研究
- Kali Linux Wireless Penetration Testing Cookbook
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- Computer Forensics with FTK
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- 安全防御入門手冊(cè)
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- Mastering Python for Networking and Security
- 云計(jì)算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 密碼朋克:自由與互聯(lián)網(wǎng)的未來
- 網(wǎng)絡(luò)空間安全體系