1) injection attack
注入攻击
1.
Hidden field to protect against malicious script injection attacks,SQL injection attacks and database security issues such as an indepth analysis and research,given the appropriate security configuration strategies,as well as specific program design techniques,reducing the hacking site chance to improve the security of the site.
针对隐藏域保护、恶意脚本注入攻击、SQL注入攻击以及数据库安全保护等问题进行了深入的分析和研究,给出了相应的安全配置策略,并提出了具体的程序设计技巧,降低了黑客入侵网站的机率,提高了网站的安全性。
2) SQL injection attacks
SQL注入攻击
1.
A New Strategy for Preventing SQL Injection Attacks;
SQL注入攻击的一个新的防范策略
2.
Research on technique of SQL injection attacks and detection;
SQL注入攻击及其防范检测技术研究
3.
According to the security of database,introducesthe concept of SQL injection atta-cks,and analyses detailedly some methods of attacking,puts forward many measures to protect from SQL injection attacks,which reduces extremely possibility of SQL injection attacks and try best to protect database,and finally uses a project example to explain how to use ASP.
NET下数据库的安全性,介绍了SQL注入攻击的概念,详细分析了几种攻击方式,并提出一些防范SQL注入攻击的措施,极大地减少SQL注入攻击的可能性,尽可能保证数据库安全,最后通过项目实例说明如何运用ASP。
3) SQL Injection Attack
SQL注入攻击
1.
Discussion on the principle and recovery of SQL injection attack;
浅议SQL注入攻击的原理及防御
2.
SQL Injection Attack and the Solution to Prevent it Based on ASP.NET;
基于ASP.NET的SQL注入攻击及防范解决方案
3.
This article introduces a typical application layer attacks against networks,SQL injection attack.
介绍了一种典型的针对网络应用层的攻击——SQL注入攻击,在分析了SQL注入攻击的形式、特点及攻击手法的基础上提出了一种基于规则的检测SQL注入攻击的方法,并给出了在Snort中的实现形式,使得SQL注入攻击在网络边缘就被识别并阻隔,以此保护服务器及内部网络的安全。
4) flushbonding attack
注入式攻击
1.
This paper have analysed the concrete manifestation of SQL flushbonding attacks,which was based on the openness of web.
具体分析了基于Web技术的开放性应用软件PHP中SQL语句最易受到的注入式攻击的具体表现形式,通过具体实例说明攻击方式及其原理,并指出了详细的解决方案和防范措施,使PHP+SQL设计的与平台无关的Web应用程序的安全性得以加强,使用户更好的将HTML和ActiveX的强大功能应用于PHP应用程序。
2.
The paper presents the analysis of prevention of SQL flushbonding attack in asp based on the openness of web,which demonstrates the form and principle of flushbonding attack with examples.
具体分析了基于W eb技术的开放性的应用软件Asp中SQL语句最易受攻击的注入式攻击的具体表现形式,通过具体实例说明攻击方式及其原理,并指出了详细的解决方案和防范措施,使Asp+SQL设计的与平台无关的W eb应用程序的安全性得以加强,使用户更好的将HTML和ActiveX的强大功能应用于ASP应用程序。
5) injection attacks
注入式攻击
1.
This paper elaborates the concepts related to injection attacks and KNN algorithm,discusses the relationship between injection attacks detection and text classification technology.
阐述了注入式攻击及KNN算法的相关概念并探讨了注入式攻击行为检测与文本分类技术的关系。
6) SQL Injection Attack
SQL注入式攻击
1.
The paper expound the security of accessing the SQL Server database based ASP NET, enumerate the problem when we accessing the database and authenticating and authorization,give the solution of avoiding SQL injection attack.
NET访问 SQL Server数据库的安全性问题进行了详细的阐述 ,列举了访问数据库时进行身份验证和授权应注意的问题 ,对避免 SQL注入式攻击给出了解决方
补充资料:注入
1.灌入。多指抽象事物。 2.记入,记下。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条