Jump to content

Recommended Posts

Posted

Learning Objectives

After taking this tutorial, you should be able to:

Categorize and explain various types of SQL injection attacks

Describe coding and design strategies for avoiding SQL injection attacks

Use DBMS_ASSERT to validate input values

Use code review tools to identify possible SQL injection vulnerabilities

Apply coding standards to eliminate SQL injection vulnerabilities

http://download.oracle.com/oll/tutorials/SQLInjection/tutorial.zip

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...