There are a lot of code injection techniques used to attack applications which use a database as a back-end by inserting malicious SQL statements.These types of injection attacks are first on the list of the top 10 web vulnerabilities.A successful exploitation grants an attacker unauthorized access to all data within a database through a web application, a full system control and the opportunity to use it as a launchpad for attacking others.Many compromised computers are used in cyber attacks and are being controlled by someone , in every region of the world.This book is about how to identify vulnerabilities and prevent SQL injection attacks,by knowing how things work can help preventing confidential data disclosure and being compromised repeatedly, it also explains in depth how SQL statements can be manipulated and how malicious code are injected.