[1]
|
C. Cerrudo, “Manipulating Microsoft SQL Server Using SQL Injection,” Application Security, Inc., 2005.
http://research.mwjournal.com/detail/RES/1124462486_292.html
|
[2]
|
D. Das, U. Sharma and D. K. Bhattacharyya, “An Approach to Detection of SQL Injection Attack Based on Dynamic Query Matching,” International Journal of Computer Applications, Vol. 1, No. 25, 2010, pp. 28-34.
|
[3]
|
G. B. Shelly, T. J. Cashman and M. E. Vermaat, “Discovering Computers 2005: A Gateway to Information,” Course Technology, Boston, 2004.
|
[4]
|
K. Stasiak, “Web Application Security,” Information Systems Control Journal, Vol. 6, 2002.
http://www.isaca.org/Content/ContentGroups/Journal1/20023/Web_Application_Security.htm
|
[5]
|
P. Carey, “Creating Web Pages with HTML and Dynamic HTML,” Course Technology, Boston, 2001.
|
[6]
|
M. Roche, “Wireless Hacking Tools,” 2007.
http://www.cse.wustl.edu/~jain/cse57107/ftp/wireless_hacking/2007
|
[7]
|
S. Garfenkel and G. Spafford, “Secure AGI/CGI Programming,” World Wide Web Journal, Vol. 2, No. 3, 1997.
http://www.w3j.com/7/s3.garfinkel.wrap.html.
|
[8]
|
W. Ke, M. Muthuprasanna and S. Kothari, “Preventing SQL Injection Attacks in Stored Procedures,” Proceedings of the Australian Software Engineering Conference, Brisbane, 31 March-1 April 2005, pp. 191-1978.
|
[9]
|
F. M. Pinguelo and B. W. Muller, “Virtual Crimes, Real Damages Part II,” Virginia Journal of Law & Technology, Vol. 17, No. 1, 2010.
|