Thank you for taking the Tutorial
|
![]() |
Categorize and explain various types of SQL injection attacks |
![]() |
Describe coding and design strategies for avoiding SQL injection attacks |
![]() |
Use DBMS_ASSERT to validate input values |
![]() |
Use code review tools to help identify possible SQL injection vulnerabilities |
![]() |
Apply coding standards to eliminate SQL injection vulnerabilities |
Last updated: June 12, 2009