SQL ներմուծում (Armenian Wikipedia)

Analysis of information sources in references of the Wikipedia article "SQL ներմուծում" in Armenian language version.

refsWebsite
Global rank Armenian rank
1st place
1st place
low place
low place
low place
low place
3,250th place
6,637th place
388th place
1,013th place
153rd place
306th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
20th place
85th place
4,194th place
3,496th place
low place
low place
low place
low place
1,317th place
2,126th place
low place
low place
7th place
40th place
low place
low place
14th place
48th place
8th place
29th place
431st place
1,978th place
low place
low place
4,121st place
low place
low place
low place
272nd place
930th place
low place
low place
low place
low place
108th place
633rd place
786th place
3,013th place
23rd place
392nd place
low place
low place
low place
low place
8,050th place
low place

alicebobandmallory.com

archive.today

arstechnica.com

bbc.co.uk

bbc.com

bloombit.com

cbsnews.com

cnet.com

news.cnet.com

darkreading.com

ddanchev.blogspot.com

dslreports.com

electronista.com

esecurityplanet.com

hackallthethings.com

howto.hackallthethings.com

ico.org.uk

imperva.com

  • Imperva (2012 թ․ հուլիս). «Imperva Web Application Attack Report» (PDF). Արխիվացված (PDF) օրիգինալից 2013 թ․ սեպտեմբերի 7-ին. Վերցված է 2013 թ․ օգոստոսի 4-ին. «Retailers suffer 2x as many SQL injection attacks as other industries. / While most web applications receive 4 or more web attack campaigns per month, some websites are constantly under attack. / One observed website was under attack 176 out of 180 days, or 98% of the time.»

justinclarke.com

maurihackers.info

microsoft.com

technet.microsoft.com

  • Microsoft. «SQL Injection». Արխիվացված օրիգինալից 2013 թ․ օգոստոսի 2-ին. Վերցված է 2013 թ․ օգոստոսի 4-ին. «SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution. Any procedure that constructs SQL statements should be reviewed for injection vulnerabilities because SQLi Server will execute all syntactically valid queries that it receives. Even parameterized data can be manipulated by a skilled and determined attacker.»

networkworld.com

nytimes.com

owasp.org

par-anoia.net

pcworld.com

php.net

pl2.php.net

phrack.com

ruhr-uni-bochum.de

nds.ruhr-uni-bochum.de

securityfocus.com

sky.com

news.sky.com

softpedia.com

news.softpedia.com

stanforddaily.com

thetechherald.com

twitter.com

web.archive.org

xarg.org

xiom.com

zdnet.com