æ·±å»ãªããã©ã¤ã³ãSQLã¤ã³ã¸ã§ã¯ã·ã§ã³ãã®è å¨ï¼OWASP AppSec USA 2013 ã¬ãã¼ãï¼åç·¨ï¼ï¼2/2 ãã¼ã¸ï¼ æ¼ãã¦ããªãããã§æ¼ãã¦ãã!? ãã©ã¤ã³ãSQLã¤ã³ã¸ã§ã¯ã·ã§ã³ã®è å¨ ããããã¯ãçè ããåè¬ãããã¬ã¼ãã³ã°ã®å 容ãç´¹ä»ãã¾ãã 1ã¤ç®ã¯ããThe Art Of Exploiting Injection Flawsãã§ããSQLã¤ã³ã¸ã§ã¯ã·ã§ã³ã«ä»£è¡¨ãããã¤ã³ã¸ã§ã¯ã·ã§ã³æ»æã«ã¤ãã¦ãè¬å¸«ãç¨æãããµã¼ãã¼ã¸ã®çä¼¼æ»æãéãããã®æ»æææ³ãç解ããã®ãç®çã§ãã è¬å¸«ã¯ããSQL Injection, attacks and defenseãã®å ±èè ã§ããããã½ã¼ã»ãã¥ã¢ï¼NotSoSecureï¼åµç«è ã®ã¹ã¼ãããã»ã·ããã¼ã«ã¿ï¼Sumit Siddharthï¼æ°ã§ãã ãã¬ã¼ãã³ã°ã§ã¯ãåºæ¬çãªSQLã¤ã³ã¸ã§ã¯ã·ã§ã³ã®ææ³ããããã©ã¤ã³ãSQLã¤ã³ã¸ã§
{{#tags}}- {{label}}
{{/tags}}