Return to Article Details SQL-injections: an overview of potential protection methods Download Download PDF