In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.
Fill in the blank(s) with the appropriate word(s).
SQL injection
Computer Science & Information Technology
You might also like to view...
Web mail is an example of SaaS
Indicate whether the statement is true or false
Computer Science & Information Technology
A compilation of sources cited in a report and listed on a separate page is a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
What is the keyboard shortcut to duplicate a layer?
What will be an ideal response?
Computer Science & Information Technology
What are the steps needed to build a behavioral model?
What will be an ideal response?
Computer Science & Information Technology