dc.contributor.author | GONCEARU, Natalia | |
dc.date.accessioned | 2019-07-02T06:30:33Z | |
dc.date.available | 2019-07-02T06:30:33Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | GONCEARU, Natalia. Injection attacks: how to protect our data. [Resursă electronică]. In: Conferinţa tehnico-ştiinţifică a studenţilor, masteranzilor şi doctoranzilor, Universitatea Tehnică a Moldovei, 26-29 martie, 2019. Chișinău, 2019, vol. 1, pp. 53-54. ISBN 978-9975-45-587-9. ISBN 978-9975-45-588-6 (Vol.1). | en_US |
dc.identifier.isbn | 978-9975-45-587-9 | |
dc.identifier.uri | http://repository.utm.md/handle/5014/2872 | |
dc.description | Resursă electronică | en_US |
dc.description.abstract | Injection attacks are amongst the oldest and most dangerous web application attacks. Injection attacks are based on a single problem that persists in many technologies: namely, no strict separation exists between program instructions and user data. There are different kind of injection attacks like HTML Injection, JavaScript Injection and SQL Injection, by far the most dangerous because its affect our personal data. There are different kind of methods to help us to protect our data and check if our data was changed | en_US |
dc.language.iso | en | en_US |
dc.publisher | Tehnica UTM | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Injection attacks | en_US |
dc.subject | HTML | en_US |
dc.subject | JavaScript | en_US |
dc.subject | SQL | en_US |
dc.title | Injection attacks: how to protect our data | en_US |
dc.type | Article | en_US |
The following license files are associated with this item: