Stop SQL Injection Attacks Before They Stop You
This article discusses:
* How SQL injection attacks work
* Testing for vulnerabilities
* Validating user input
* Using .NET features to prevent attacks
* Importance of handling exceptions
This article discusses:
* How SQL injection attacks work
* Testing for vulnerabilities
* Validating user input
* Using .NET features to prevent attacks
* Importance of handling exceptions
One of the neatest T-SQL enhancements in SQL Server 2005 is the ROW_NUMBER() function. New author Charles Hawkins brings us an explanation of how you can use this function along with a Common Table Expression to remove duplicate data.
This whitepaper is intended to shed light on the issues affecting application performance in the wide area, and to give IT managers the knowledge required to design strategic enterprise application acceleration and deployment solutions
String manipulation is not one of the strong points of T-SQL, but there are some functions that can greatly assist you with searching and working with character values. New author Robert Davis brings us a look at PATINDEX, one of the search functions and also explains the differences between it and the often used CHARINDEX.
Should you use dynamic or static SQL in your SQL Server application? This is a hotly debated topic and Arthur Fuller brings his thoughts to this debate.
there are occasions in all of our working lives when sitting through a PowerPoint presentation is inevitable. Fortunately, there are techniques for feigning interest, many of which have developed over hundreds of years. All you need is a handful of like-minded colleagues with a sporting attitude
SQL Server 2005 brings us a number of enhancements, but the most important to T-SQL developers may be the changes to error and exception handling. The addition of the TRY CATCH structure is an important change and Raj Vasant brings us a look at this enhancement.
This paper describes how SQL Server 2005 can be used to support row- and cell-level security (RLS/CLS). The examples provided in this white paper show how RLS and CLS can be used to meet classified database security requirements.
Replication is a great tool, but it has a number of restrictions on what you can do with replicated databases. Typically you cannot easily move a replicated database, but our own Andy Warren brings us a technique that can get around this.
This article presents an excerpt from the book, Applied Microsoft Analysis Services, by Teo Lachev. Learn how to author “smart” reports using Reporting Services (SSRS), Analysis Services (SSAS), and SQL Server CLR stored procedures. Get the reports demonstrated in this article by downloading the sample code.
By Steve Jones
I have a presentation on finding balance in your career that got quite a...
By Brian Kelley
But as I've matured over the years, I came to realize that I needed...
By alevyinroc
I will be presenting my latest session, Documenting Your Work for Worry-Free Vacations, in-person...
I have a table with latitude longitude in the format. 45.123456 , -111.123456 ,...
Team, I'm trying to figure out what will be the best recommendation to configure...
Comments posted to this topic are about the item A Fun Computer Quote
Which movie featured this quote?
"All programs have a desire to be useful."Happy April Fools! See possible answers