SQL Injection

Loading...
来自 科罗拉多大学系统 的课程
Software Design Threats and Mitigations
3 评分
科罗拉多大学系统
3 评分
课程 4(共 4 门,Specialization Secure Software Design
从本节课中
Simple software compromises
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!

与讲师见面

  • Albert Glock
    Albert Glock
    Instructor
    Computer Science