SQL Injection, Part 8 Of 8: Conclusions And Resources

I have created a page on the right-hand bar of this blog for all of the SQL injection articles in this series. Having them all show up in one spot should give you a complete picture on this topic.

When I originally presented this to my organization’s development and IT management teams, I included a list of resources, which I include here for the sake of completeness:

I have also scattered a few links in the articles themselves, so check those out as well.

Since putting together this series, I had the opportunity to read chapter 6 of Denny Cherry’s Securing SQL Server, which is all about SQL injection.  I do recommend getting a copy of the book, and although I did not use his book as a reference (because I just read the chapter today, after completing the series), he covers a number of the same topics that I do, but also touches on some items that I did not, such as how to clean up after a SQL injection attack.

One thought on “SQL Injection, Part 8 Of 8: Conclusions And Resources

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s