Getting Started
Nature and Scope of the Problem
Understanding Filtering, Validation,
and Output Escaping
Preventing the Most
Common Forms of Attack
Protecting Against Common
Website Vulnerabilities
Protecting Against
SQL Injection Attacks
About the Author
How can you protect a MySQL database?
How do you implement MySQL
database escaping or quoting?
How do you use prepared statements?
LAB: Protecting a MySQL database against SQL injection
+
o
-