Thank you for taking the Tutorial
|
| Categorize and explain various types of SQL injection attacks | |
| Describe coding and design strategies for avoiding SQL injection attacks | |
| Use DBMS_ASSERT to validate input values | |
| Use code review tools to help identify possible SQL injection vulnerabilities | |
|
Apply coding standards to eliminate SQL injection vulnerabilities |
Last updated: June 12, 2009