DSpace Repository

Injection attacks: how to protect our data

Show simple item record

dc.contributor.author GONCEARU, Natalia
dc.date.accessioned 2019-07-02T06:30:33Z
dc.date.available 2019-07-02T06:30:33Z
dc.date.issued 2019
dc.identifier.citation GONCEARU, Natalia. Injection attacks: how to protect our data. [Resursă electronică]. In: Conferinţa tehnico-ştiinţifică a studenţilor, masteranzilor şi doctoranzilor, Universitatea Tehnică a Moldovei, 26-29 martie, 2019. Chișinău, 2019, vol. 1, pp. 53-54. ISBN 978-9975-45-587-9. ISBN 978-9975-45-588-6 (Vol.1). en_US
dc.identifier.isbn 978-9975-45-587-9
dc.identifier.uri http://repository.utm.md/handle/5014/2872
dc.description Resursă electronică en_US
dc.description.abstract Injection attacks are amongst the oldest and most dangerous web application attacks. Injection attacks are based on a single problem that persists in many technologies: namely, no strict separation exists between program instructions and user data. There are different kind of injection attacks like HTML Injection, JavaScript Injection and SQL Injection, by far the most dangerous because its affect our personal data. There are different kind of methods to help us to protect our data and check if our data was changed en_US
dc.language.iso en en_US
dc.publisher Tehnica UTM en_US
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject Injection attacks en_US
dc.subject HTML en_US
dc.subject JavaScript en_US
dc.subject SQL en_US
dc.title Injection attacks: how to protect our data en_US
dc.type Article en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search DSpace


Advanced Search

Browse

My Account