Return to Article Details Proposed Methods To Prevent SQL Injection Download Download PDF