Tuesday, 29 April 2014

SQL Injection Prevention & Detection Techniques


  • Database Design Best Practices
  • Defensive Coding Best Practices
  • Penetration Testing
  • Static Analysis of Code
  • Safe Development Libraries
  • Proxy Filters

  • Anomaly Based Intrusion Detection
  • Instruction Set Randomization
  • Dynamic Tainting
  • Model-based Checkers

No comments:

Post a Comment