- Stored procedure: Sealed script as the best way to prevent SQL injection attacks.
- Input validation: Controls input, prevents SQL injection, buffer and integer overflow attacks.
- Baseline: List of applications before and after to see changes. Only method to detect zero-day attacks.
- Obfuscation: Masks or obscures code.
- Steganography: Hides data inside other data.
- Sandboxing: Isolates applications for testing and patching if they are dangerous.
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.