Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Jump to navigation
Jump to search
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 5: | Line 5: | ||
== 1. Introduction == | == 1. Introduction == | ||
<p align="right>''We can get good designs by following good practices instead of poor ones. | <p align="right">''We can get good designs by following good practices instead of poor ones.<br /> | ||
~F. Brooks, Jr.</p> | ~F. Brooks, Jr.''</p> | ||