. . "Mot\u00FDl, Ivo" . . "P\u00E1lka, Jan" . . "S" . . "[1986E5708E89]" . . "Internet, bezpe\u010Dnost a konkurenceschopnost organizac\u00ED. \u0158\u00EDzen\u00ED proces\u016F a vyu\u017Eit\u00ED modern\u00EDch teermin\u00E1lov\u00FDch technologi\u00ED" . "5"^^ . "2"^^ . . "Ways to Protect Information System Against Technniques of SQL Injection"@en . "Ways to Protect Information System Against Technniques of SQL Injection"@en . . "2010-01-01+01:00"^^ . "2"^^ . . "The article describes a technique called SQL injection, points to its principles and methods of its use in poorly secured information systems. The first part of the article focuses on the principles, characteristics and threats to SQL injection brings. The next section describes the methods of security and defence against SQL injection elements. The final section presents the tools for testing and identifying weak points and proposed solutions to increase the level of security information system." . . "28140" . "RIV/70883521:28140/10:63509128" . "RIV/70883521:28140/10:63509128!RIV11-MSM-28140___" . . "Ways to Protect Information System Against Technniques of SQL Injection" . . . . . "298635" . "Zl\u00EDn" . "978-83-61645-16-0" . "Zl\u00EDn" . "SQL injection; security; database; script; information system"@en . . "The article describes a technique called SQL injection, points to its principles and methods of its use in poorly secured information systems. The first part of the article focuses on the principles, characteristics and threats to SQL injection brings. The next section describes the methods of security and defence against SQL injection elements. The final section presents the tools for testing and identifying weak points and proposed solutions to increase the level of security information system."@en . . . "Ways to Protect Information System Against Technniques of SQL Injection" . "Univerzita Tom\u00E1\u0161e Bati ve Zl\u00EDn\u011B, Fakulta aplikovan\u00E9 informatiky" .