Intrusion Protection against SQL Injection Attacks Using a Reverse Proxy

Abstract

In this era where Internet has captured the world, level of security that this Internet provides has not grown as fast as the Internet application. Internet has eased the life of human in numerous ways, but the drawbacks like the intrusions that are attached with the Internet applications sustains the growth of these applications. One such intrusion is the… (More)

Topics

10 Figures and Tables

Slides referencing similar topics