Frank S. Rietta

Learn More
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the applications and not the database directly, there are some techniques that can be deployed to mitigate the risk at the database server. Database intrusion detection systems are often based on(More)
Managing spam is an increasingly critical function for businesses of all sizes. The onslaught of spam significantly degrades the reliability of e-mail for business communication. Many web sites provide web-based e-mail forms instead of listing e-mail addresses. Spam-mers and phishers have been using increasingly sophisticated techniques to attack these(More)
  • 1