electronic Journal of Computer Science and Information Technology

Displaying 1-2 of 2 results

  • White Papers // Aug 2013

    Backup Synchronization on Different Operating Systems

    The processes of backing up and synchronizing computer data are common. Backups may be retained in multiple computers or storage devices to protect data from risks such as hard disk failure, computer theft or even accidental deletion. There are many software applications which are designed for synchronizing backups but few...

    Provided By electronic Journal of Computer Science and Information Technology

  • White Papers // Feb 2011

    Coalesce Techniques to Secure Web Applications and Databases Against SQL Injection Attacks

    SQL Injection attacks are one of the gravest threats for web applications. In this paper, the authors propose coalesce techniques to mitigate SQL injection attacks and focus on the research of the attack protection module. These techniques are based on a filter, cryptographic hash-function, linear probing technique, customized error message...

    Provided By electronic Journal of Computer Science and Information Technology

  • White Papers // Aug 2013

    Backup Synchronization on Different Operating Systems

    The processes of backing up and synchronizing computer data are common. Backups may be retained in multiple computers or storage devices to protect data from risks such as hard disk failure, computer theft or even accidental deletion. There are many software applications which are designed for synchronizing backups but few...

    Provided By electronic Journal of Computer Science and Information Technology

  • White Papers // Feb 2011

    Coalesce Techniques to Secure Web Applications and Databases Against SQL Injection Attacks

    SQL Injection attacks are one of the gravest threats for web applications. In this paper, the authors propose coalesce techniques to mitigate SQL injection attacks and focus on the research of the attack protection module. These techniques are based on a filter, cryptographic hash-function, linear probing technique, customized error message...

    Provided By electronic Journal of Computer Science and Information Technology