z-logo
open-access-imgOpen Access
Safe Guard Anomalies against SQL Injection Attacks
Author(s) -
Romil Rawat,
Chandrapal Singh Dangi,
Jagdish Patil
Publication year - 2011
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/2558-3511
Subject(s) - computer science , guard (computer science) , sql injection , sql , computer security , database , world wide web , programming language , query by example , web search query , search engine
internet, web application exists and for web application syntax, semantics, coding and design exists, and for coding and designing, algorithm exists, and for algorithm, protecting techniques and rules exists, But as the internet technologies advanced, vulnerability also advanced .Various old procedures, algorithm functions, coding and designing syntax and semantics are there, which are vulnerable to attack and if used could be easily traced or hacked by the attacker. Old practices which are vulnerable should be banned in organization, companies and govt. sectors and secure guidelines should be issued, which consists of security guildelines.and should be strictly followed. In this paper we have proposed coding flaws at different platforms and their solutions.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom