The principles of SQL injection are discussed,and its general laws are analyzed in detail.SQL injection can be judged with reshaping and character string parameters and the aim of injection can be judged according to the type,table name and field name of
参考文献
相似文献
引证文献
引用本文
钟增胜. SQL注入漏洞的分析及防范[J].重庆工商大学学报(自然科学版),2005,(6): ZHONG Zeng - sheng. On analysis and prevention of SQL injection[J]. Journal of Chongqing Technology and Business University(Natural Science Edition),2005,(6):