首页 | 本学科首页   官方微博 | 高级检索  
     

浅析SQL注入式攻击与防范
引用本文:唐磊. 浅析SQL注入式攻击与防范[J]. 电脑与微电子技术, 2012, 0(1): 49-52
作者姓名:唐磊
作者单位:重庆三峡职业学院,重庆404000
摘    要:在当今的数字世界中.人们发现在维持公开的Intemet连接的同时,保护网络和计算机系统的安全变得越来越困难。病毒、木马、后门、蠕虫等攻击层出不穷,虚假网站的钓鱼行为也让警惕性不高的公众深受其害。对SQL注入式攻击的过程做出分析,并提出检测方法和防范措施。

关 键 词:SQL注入式攻击  漏洞  入侵  正则表达式

Analysis and Prevention of SQL Injection Attacks
TANG Lei. Analysis and Prevention of SQL Injection Attacks[J]. , 2012, 0(1): 49-52
Authors:TANG Lei
Affiliation:TANG Lei (Chongqing Three Gorges College, Chongqing 404000)
Abstract:In today's digital world, it was found to maintain an open Internet connection at the same time, protect the network and computer system security has become increasingly difficult. Viruses, trojans, backdoors, worms and other emerging attacks, false fishing sites do not let high public vigilance suffer. Analyses the process of SQL injection attacks, and proposes test methods and prevention measures.
Keywords:SQL Injection Attack  Vulnerability  Intrusion  Regular Expression
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号