1 |
OWASP, CSRF Guard, http://www.owasp.org/index.php/CSRF_Guard
|
2 |
David Gourley and Brian Totty, "HTTP: The Definitive Guide", O'Reilly Media, 2002.
|
3 |
http://www.owasp.org/index.php/Cross- Site_Request_Forgery
|
4 |
이미정,노시춘, SQL Injection 취약점 진단 프로그램,2005.6
|
5 |
Stepen Cost, An Introduction to SQL Injection Attacks,for Oracle develops, 2007.3
|
6 |
http://redsea23.egloos.com/243019 SQL Injection 공격과 방어 방법
|
7 |
박상옥, 웹 관리자를 위한 응급처치법-SQL Injection 해킹 보안,2011.11
|
8 |
http://www.krcert.or.kr/unim
|
9 |
http://www.krcert.or.kr/index.jsp
|
10 |
http://www.superuser.biz/tag/sql
|
11 |
http://support.oullim.co.kr/portal/Tec hletter/200 80615/news4.htm
|
12 |
http://dev.mysql.com/downloads/gui-tools/ 5.0.html
|
13 |
http://kline03.egloos.com/445826
|
14 |
http://www.google.co.kr/imgres?imgurl= http://blog.outsider.ne.kr/attach/1/1154314780
|
15 |
http://database.sarang.net/database/postgres/ tutorial/lecture/c89.htm
|