Difference between revisions of "CSE539 Applied Cryptography"
From esoterum.org
Line 10: | Line 10: | ||
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February === | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February === | ||
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection] | *[http://en.wikipedia.org/wiki/SQL_injection SQL injection] | ||
+ | *[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook] |
Revision as of 17:49, 26 February 2007
Good to know
Ken Thompson's On Trusting Trust, 1984