ripoff Posted May 11, 2011 Report Posted May 11, 2011 Learning ObjectivesAfter taking this tutorial, you should be able to: Categorize and explain various types of SQL injection attacks Describe coding and design strategies for avoiding SQL injection attacks Use DBMS_ASSERT to validate input values Use code review tools to identify possible SQL injection vulnerabilitiesApply coding standards to eliminate SQL injection vulnerabilitieshttp://download.oracle.com/oll/tutorials/SQLInjection/tutorial.zip Quote