This HTML5 document contains 42 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n17http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n8http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F70883521%3A28140%2F10%3A63509128%21RIV11-MSM-28140___/
n20http://purl.org/net/nknouf/ns/bibtex#
n14http://localhost/temp/predkladatel/
n10http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n5http://linked.opendata.cz/ontology/domain/vavai/
n18https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n19http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n15http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n16http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F70883521%3A28140%2F10%3A63509128%21RIV11-MSM-28140___
rdf:type
n5:Vysledek skos:Concept
dcterms:description
The article describes a technique called SQL injection, points to its principles and methods of its use in poorly secured information systems. The first part of the article focuses on the principles, characteristics and threats to SQL injection brings. The next section describes the methods of security and defence against SQL injection elements. The final section presents the tools for testing and identifying weak points and proposed solutions to increase the level of security information system. The article describes a technique called SQL injection, points to its principles and methods of its use in poorly secured information systems. The first part of the article focuses on the principles, characteristics and threats to SQL injection brings. The next section describes the methods of security and defence against SQL injection elements. The final section presents the tools for testing and identifying weak points and proposed solutions to increase the level of security information system.
dcterms:title
Ways to Protect Information System Against Technniques of SQL Injection Ways to Protect Information System Against Technniques of SQL Injection
skos:prefLabel
Ways to Protect Information System Against Technniques of SQL Injection Ways to Protect Information System Against Technniques of SQL Injection
skos:notation
RIV/70883521:28140/10:63509128!RIV11-MSM-28140___
n3:aktivita
n19:S
n3:aktivity
S
n3:dodaniDat
n16:2011
n3:domaciTvurceVysledku
n10:4502485 n10:1905457
n3:druhVysledku
n15:D
n3:duvernostUdaju
n6:S
n3:entitaPredkladatele
n8:predkladatel
n3:idSjednocenehoVysledku
298635
n3:idVysledku
RIV/70883521:28140/10:63509128
n3:jazykVysledku
n13:eng
n3:klicovaSlova
SQL injection; security; database; script; information system
n3:klicoveSlovo
n4:script n4:security n4:information%20system n4:database n4:SQL%20injection
n3:kontrolniKodProRIV
[1986E5708E89]
n3:mistoKonaniAkce
Zlín
n3:mistoVydani
Zlín
n3:nazevZdroje
Internet, bezpečnost a konkurenceschopnost organizací. Řízení procesů a využití moderních teerminálových technologií
n3:obor
n7:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
2
n3:rokUplatneniVysledku
n16:2010
n3:tvurceVysledku
Motýl, Ivo Pálka, Jan
n3:typAkce
n17:EUR
n3:zahajeniAkce
2010-01-01+01:00
s:numberOfPages
5
n20:hasPublisher
Univerzita Tomáše Bati ve Zlíně, Fakulta aplikované informatiky
n18:isbn
978-83-61645-16-0
n14:organizacniJednotka
28140