Table of Contents
- Structured Query Language for SQL Injection
- Manipulating SQL
- Setting Up the Environment
- Attacking Web, Mobile, and IoT Applications
- Preventing SQL Injection with Defensive Solutions
- Putting It All Together

Practical techniques to secure old vulnerabilities against modern attacks