- SQL Injection Strategies
- Ettore Galluccio Edoardo Caselli Gabriele Lombari
- 44字
- 2021-06-18 18:34:27
Technical requirements
For this chapter and the next, the topics we will cover will mostly be theoretical. However, we suggest that you read the SQL technical documentation. Here, we have provided, for reference, the MySQL, Oracle, and Microsoft SQL Server documentation:
推薦閱讀
- 云原生安全:攻防實踐與體系構建
- Node Security
- Metasploit Penetration Testing Cookbook(Second Edition)
- API安全實戰
- Wireshark 2 Quick Start Guide
- Preventing Digital Extortion
- 電腦安全與攻防入門很輕松(實戰超值版)
- 網絡服務安全與監控
- 復雜信息系統網絡安全體系建設指南
- Practical Internet of Things Security
- 5G網絡安全規劃與實踐
- Blockchain Development with Hyperledger
- 企業安全建設入門:基于開源軟件打造企業網絡安全
- 2023—2024年中國網絡安全發展藍皮書
- 深入探索區塊鏈