-
1
-
-
34548040621
-
Creating and Optimizing Views in SQL Server
-
Andy Baron, Mary Chipman. Creating and Optimizing Views in SQL Server. Article from: http://www.informit.com /articles/printerfriendly.asp?p= 130855&rl=1 (2000)
-
(2000)
Article from
-
-
Baron, A.1
Chipman, M.2
-
2
-
-
0030732547
-
An Extended Authorization Model for Relational Databases
-
Pages
-
Elisa Bertino, Pierangela Samarati, Sushil Jajodia. An Extended Authorization Model for Relational Databases, In Proceeding of IEEE Transactions on Knowledge and Data Engineering, Volume 9, Issue 1, Pages: 85-101 (1997)
-
(1997)
Proceeding of IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.1
, pp. 85-101
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
10
-
-
84909595754
-
-
Ciudad Real, Spain, Pages
-
Wai Lup Low, Joseph Lee, Peter Teoh. DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions. In Proceedings of the 4th International Conference on Enterprise Information Systems, Ciudad Real, Spain, Pages: 121-128 (2002)
-
(2002)
Proceedings of the 4th International Conference on Enterprise Information Systems, DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
, pp. 121-128
-
-
Lup Low, W.1
Lee, J.2
Teoh, P.3
-
11
-
-
34548037836
-
Injection Attacks and Some Tips on How to Prevent Them
-
Colin Angus Mackay. SQL Injection Attacks and Some Tips on How to Prevent Them. Article from: http://www.codeproject.com/cs/database / SqlInjectionAttacks.asp (2005)
-
(2005)
Article from
-
-
Colin Angus Mackay, S.Q.L.1
-
12
-
-
34548047173
-
SQL Injection Signatures Evasion
-
Ofer Maor, Amichai Shulman. SQL Injection Signatures Evasion. Article from: http://imperva.com/application_defense_center/white_papers /sql_injection_signatures_evasion.html (2004)
-
(2004)
Article from
-
-
Maor, O.1
Shulman, A.2
-
13
-
-
34548052404
-
-
K. K. Mookhey, Nilesh Burghate. Detection of SQL Injection and Cross-site Scripting Attacks, Article from: http://www.securityfocus.com/infocus/1768 (2004)
-
K. K. Mookhey, Nilesh Burghate. Detection of SQL Injection and Cross-site Scripting Attacks, Article from: http://www.securityfocus.com/infocus/1768 (2004)
-
-
-
-
17
-
-
26444575798
-
-
Fredrik Valeur, Darren Mutz, Giovanni Vigna. A Learning-based Approach to the Detection of SQL Attacks. DIMVAn Vienna, Austria, Pages: 123-140 (2005)
-
Fredrik Valeur, Darren Mutz, Giovanni Vigna. A Learning-based Approach to the Detection of SQL Attacks. DIMVAn Vienna, Austria, Pages: 123-140 (2005)
-
-
-
-
21
-
-
34548018006
-
-
Controlling Database Access, Oracle9i Database Concepts Release 2 (9.2). Article from: http://download-west.oracle.com/docs/cd/B10501_01/server.920/ a96524/c23acces.htm
-
Controlling Database Access, Oracle9i Database Concepts Release 2 (9.2). Article from: http://download-west.oracle.com/docs/cd/B10501_01/server.920/ a96524/c23acces.htm
-
-
-
-
22
-
-
34548028666
-
-
Online Book-Store application. The open source from the site:http://www.gotocode.com/apps.asp?app_id=3&
-
Online Book-Store application. The open source from the site:http://www.gotocode.com/apps.asp?app_id=3&
-
-
-
|