
Please use this identifier to cite or link to this item:
http://192.168.98.239:8080/jspui/handle/1994/938Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.date.accessioned | 2018-02-02T11:00:04Z | - |
| dc.date.available | 2018-02-02T11:00:04Z | - |
| dc.date.issued | 2015-06 | - |
| dc.identifier.uri | http://192.168.98.42:8080/jspui/handle/1994/938 | - |
| dc.description.abstract | Available | en_US |
| dc.format.extent | 18p. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Tezpur University | en_US |
| dc.subject | Computer Science and Engineering | en_US |
| dc.subject | SQL | en_US |
| dc.title | Detection of SQL injection attacks | en_US |
| dc.type | Technical Report | en_US |
| dc.contributor.guide | Das, Debasish | - |
| dc.creator.researcher | Kumar, Ravi Shankar | - |
| Appears in Collections: | Dissertations | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 01_title_1336.pdf | Title | 184.39 kB | Adobe PDF | ![]() View/Open |
| 02_abstract_1336.pdf | Abstract | 20.68 kB | Adobe PDF | ![]() View/Open |
| 03_cert_ack_decn_1336.pdf | Certificate, Declaration and Acknowledgement | 482.36 kB | Adobe PDF | ![]() View/Open |
| 04_cont_tab_fig_1336.pdf | List of Contents, Tables and Figures | 51.87 kB | Adobe PDF | ![]() View/Open |
| 05_main chapters_1336.pdf Restricted Access | Main Chapters and References | 1.15 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



