The article describes various protection methods of database and types of SQL Injection attacks. These are extremely dangerous attacks because they threaten the confidentiality of sensitive data. In order to analyze in detail protection methods and methods of attacks, simulations of attacks and defence were performed in the following languages: C #, PHP, Java. Based on the simulation results for particular languages, the effectiveness and efficiency of database protection methods were compared
Teoretická část práce je zaměřena na analýzu nejčastějších typů útoků na webové stránky a aplikace, ...
SQL injection je technika namierená proti webovým aplikáciám využívajúcim SQL databázu, ktorá môže p...
The aim of this paper is to conduct research on the most popular database management systems such as...
The article describes various protection methods of database and types of SQL Injection attacks. The...
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Bas...
The topics covered in this article are the risks that must be taken into account when developing the...
The article discusses the issue of the security of Internet applications. The most popular types of ...
This article is about web application security. Describes the most common types of web attacks. The ...
Application security is one of the key aspects necessary for its proper functioning. Ensuring securi...
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried...
The article presents a comparative analysis of selected skeletons for dependency injection in Java. ...
W poniższej pracy zostały opisane najważniejsze, wybrane aspekty bezpieczeństwa baz danych. Pierwsza...
Optimization of SQL queries is an important part of any system using a database. Several different o...
Završni rad upoznaje čitatelje s glavnim aspektima napada umetanjem SQL koda. Prolazi se kroz temel...
. This article presents the methods of enhancing the performance and security of web applications. I...
Teoretická část práce je zaměřena na analýzu nejčastějších typů útoků na webové stránky a aplikace, ...
SQL injection je technika namierená proti webovým aplikáciám využívajúcim SQL databázu, ktorá môže p...
The aim of this paper is to conduct research on the most popular database management systems such as...
The article describes various protection methods of database and types of SQL Injection attacks. The...
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Bas...
The topics covered in this article are the risks that must be taken into account when developing the...
The article discusses the issue of the security of Internet applications. The most popular types of ...
This article is about web application security. Describes the most common types of web attacks. The ...
Application security is one of the key aspects necessary for its proper functioning. Ensuring securi...
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried...
The article presents a comparative analysis of selected skeletons for dependency injection in Java. ...
W poniższej pracy zostały opisane najważniejsze, wybrane aspekty bezpieczeństwa baz danych. Pierwsza...
Optimization of SQL queries is an important part of any system using a database. Several different o...
Završni rad upoznaje čitatelje s glavnim aspektima napada umetanjem SQL koda. Prolazi se kroz temel...
. This article presents the methods of enhancing the performance and security of web applications. I...
Teoretická část práce je zaměřena na analýzu nejčastějších typů útoků na webové stránky a aplikace, ...
SQL injection je technika namierená proti webovým aplikáciám využívajúcim SQL databázu, ktorá môže p...
The aim of this paper is to conduct research on the most popular database management systems such as...