Skip to content
Menu
GC the Software Engineer
Home
About
GC the Software Engineer
Code, algorithms and more
How To: Mitigate SQL Injection from Untrusted Table Name
Posted On 28/01/2018