Open Access Open Access  Restricted Access Subscription Access

Securing Web Applications and Databases against SQL Injection Attacks

Surepeddi Gowtham

Abstract


Restricted access! The contents are blocked by the system. Please consult the technical assistant.


Keywords


SQL Injection; Database Security; Authentication

Full Text:

PDF

Refbacks

  • There are currently no refbacks.


 

 
  

 

  


About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).