Journal article

ANTAL Lukáš, BARABAS Maroš and HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část I. DSM Data Security Management. 2014, vol. 18, no. 1, pp. 36-39. ISSN 1211-8737.
Publication language:czech
Original title:Kompromitace dat pomocí SQL Injection, část I.
Title (en):Data compromise by SQL Injection, part I.
Journal:DSM Data Security Management, Vol. 18, No. 1, CZ
attack, compromise, injection, OWASP, SQL, validation, web
SQL Injection vulnerability (SQL injection or abbreviation SQLi) has been known since the first web information systems connected to a database. Yet even today vulnerability is often misused by attackers to steal sensitive data. The first part of this article describes the most common uses of this vulnerability for database data theft. In other articles we describe lesser known methods of attacks and defense.
   author = {Luk{\'{a}}{\v{s}} Antal and Maro{\v{s}} Barabas
	and Petr Han{\'{a}}{\v{c}}ek},
   title = {Kompromitace dat pomoc{\'{i}} SQL Injection,
	{\v{c}}{\'{a}}st I.},
   pages = {36--39},
   journal = {DSM Data Security Management},
   volume = {18},
   number = {1},
   year = {2014},
   ISSN = {1211-8737},
   language = {czech},
   url = {}

Your IPv4 address:
Switch to https