Stop SQL Injection Attacks Before They Stop You
This article discusses:
* How SQL injection attacks work
* Testing for vulnerabilities
* Validating user input
* Using .NET features to prevent attacks
* Importance of handling exceptions
This article discusses:
* How SQL injection attacks work
* Testing for vulnerabilities
* Validating user input
* Using .NET features to prevent attacks
* Importance of handling exceptions
One of the neatest T-SQL enhancements in SQL Server 2005 is the ROW_NUMBER() function. New author Charles Hawkins brings us an explanation of how you can use this function along with a Common Table Expression to remove duplicate data.
This whitepaper is intended to shed light on the issues affecting application performance in the wide area, and to give IT managers the knowledge required to design strategic enterprise application acceleration and deployment solutions
String manipulation is not one of the strong points of T-SQL, but there are some functions that can greatly assist you with searching and working with character values. New author Robert Davis brings us a look at PATINDEX, one of the search functions and also explains the differences between it and the often used CHARINDEX.
Should you use dynamic or static SQL in your SQL Server application? This is a hotly debated topic and Arthur Fuller brings his thoughts to this debate.
there are occasions in all of our working lives when sitting through a PowerPoint presentation is inevitable. Fortunately, there are techniques for feigning interest, many of which have developed over hundreds of years. All you need is a handful of like-minded colleagues with a sporting attitude
SQL Server 2005 brings us a number of enhancements, but the most important to T-SQL developers may be the changes to error and exception handling. The addition of the TRY CATCH structure is an important change and Raj Vasant brings us a look at this enhancement.
This paper describes how SQL Server 2005 can be used to support row- and cell-level security (RLS/CLS). The examples provided in this white paper show how RLS and CLS can be used to meet classified database security requirements.
Replication is a great tool, but it has a number of restrictions on what you can do with replicated databases. Typically you cannot easily move a replicated database, but our own Andy Warren brings us a technique that can get around this.
This article presents an excerpt from the book, Applied Microsoft Analysis Services, by Teo Lachev. Learn how to author “smart” reports using Reporting Services (SSRS), Analysis Services (SSAS), and SQL Server CLR stored procedures. Get the reports demonstrated in this article by downloading the sample code.
By ChrisJenkins
Do you spend so long manipulating your data into something vaguely useful that you...
By Steve Jones
It was neat to stumble on this in the book, a piece by me,...
Forgive me for the title. Mentally I’m 12. When I started my current day...
Comments posted to this topic are about the item Microsoft Security Changes and SQL...
Comments posted to this topic are about the item Expanding into Print
Comments posted to this topic are about the item Downtime Caused by the Postgres...
In SQL Server 2025, what is returned by this code:
SELECT EDIT_DISTANCE('Steve', 'Stan')
Assume preview features are enabled. See possible answers