In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.
Fill in the blank(s) with the appropriate word(s).
SQL injection
Computer Science & Information Technology
You might also like to view...
Each website has a unique HTML address and a corresponding unique domain name.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
IRB stands for Interactive Ruby and is used to interactively submit Ruby statements for immediate processing.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology