CISSP Software Development Security

Question 1

Joan is developing a new web application and wants to protect against SQL injection attack. What is the best technique she can use to defend against this threat?

Page 1 out of 10