THIS PAGE IS STILL BEING DEVELOPED ... check back soon
OWASP Top 10 Software Vulnerabilities - OWASP Top Ten
What is Injection?
- Link
- Link 2
How do we try and minimize the risk?
How do parameters protect the database?
How do we use parameters in SQL?
Why do we need to encrypt some of our data?
How do we encrypt passwords and other data?