Explore >> Select a destination


You are here

www.sqldoubleg.com
| | nocolumnname.blog
2.5 parsecs away

Travel
| | Words: 861 Time to read: ~ 5 minutes Welcome to T-SQL Tuesday, the monthly blogging party where we talk about a topic given to us by the host. This month, we have Steve Jones (blog | twitter) asking us about Dynamic SQL. There are a myriad number of uses for Dynamic SQL - I've already...
| | www.securityjourney.com
4.0 parsecs away

Travel
| | Why cybersecurity pros need to learn how to code
| | therestisjustcode.wordpress.com
1.5 parsecs away

Travel
| | This month's T-SQL Tuesday is hosted by Brent Ozar andhe's asked everyone to find interestingbug or enhancement requests in Microsoft Connect related to SQL Server. The Connect item doesn't have to have anything to do with T-SQL - it could be about the engine, SSRS, R, the installer, whatever. Now, more than ever, Microsoft has...
| | blog.securityinnovation.com
19.4 parsecs away

Travel
| Command Injection allows attackers to inject commands into software and then execute them with the software's privileges. Here's how to test for them.