Difference between revisions of "CSE539 Applied Cryptography"
From esoterum.org
Line 11: | Line 11: | ||
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection] | *[http://en.wikipedia.org/wiki/SQL_injection SQL injection] | ||
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook] | *[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook] | ||
+ | *[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses] |
Revision as of 23:01, 27 February 2007
Good to know
Ken Thompson's On Trusting Trust, 1984