{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T22:02:20Z","timestamp":1750802540652,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231060","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"64-67","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["New challenges in teaching database security"],"prefix":"10.1145","author":[{"given":"Mario","family":"Guimaraes","sequence":"first","affiliation":[{"name":"Kennesaw State University, Kennesaw GA"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107640"},{"key":"e_1_3_2_1_2_1","unstructured":"Pfleeger C. P. and Pfleeger S. L. Security in Computing Chapter 6 3rd ed. Prentice Hall (2003) (ISBN 0130355488).   Pfleeger C. P. and Pfleeger S. L. Security in Computing Chapter 6 3rd ed. Prentice Hall (2003) (ISBN 0130355488)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1059524.1059535"},{"key":"e_1_3_2_1_4_1","unstructured":"Marvets Eric \"Microsoft Security Summits 2006\" April 13 2006 Atlanta Georgia.  Marvets Eric \"Microsoft Security Summits 2006\" April 13 2006 Atlanta Georgia."},{"key":"e_1_3_2_1_5_1","unstructured":"Gregory Travis Ed Balas David Ripley and Steven Wallace. \"Analysis of the SQL Slammer Worm and its effects on Indiana University and related institutions.\"http:\/\/www.anml.iu.edu\/downloads\/SLAMMER.pdf. Advanced Network Management Lab Cybersecurity Initiative. University of Indiana. Bloomington Indiana.  Gregory Travis Ed Balas David Ripley and Steven Wallace. \"Analysis of the SQL Slammer Worm and its effects on Indiana University and related institutions.\"http:\/\/www.anml.iu.edu\/downloads\/SLAMMER.pdf. Advanced Network Management Lab Cybersecurity Initiative. University of Indiana. Bloomington Indiana."},{"key":"e_1_3_2_1_6_1","unstructured":"Brendan P. Kehoe \"The Robert Morris Internet Worm\". http:\/\/www.swiss.ai.mit.edu\/6805\/articles\/morris-worm.html.  Brendan P. Kehoe \"The Robert Morris Internet Worm\". http:\/\/www.swiss.ai.mit.edu\/6805\/articles\/morris-worm.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Wikipedia \"SQL slammer (computer worm)\" http:\/\/en.wikipedia.org\/wiki\/SQLSlammer.  Wikipedia \"SQL slammer (computer worm)\" http:\/\/en.wikipedia.org\/wiki\/SQLSlammer."},{"key":"e_1_3_2_1_8_1","unstructured":"Edward Ray \"SQL Slammer\" http:\/\/www.sans.org\/resources\/malwarefaq\/ms-sql-exploit.php.  Edward Ray \"SQL Slammer\" http:\/\/www.sans.org\/resources\/malwarefaq\/ms-sql-exploit.php."},{"volume-title":"Retrieved","year":"2004","author":"Litwin P.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Microsoft TechNet Cross-Site Scripting and SQL Code Injection http:\/\/www.microsoft.com\/technet\/community\/chats\/trans\/sql\/sq19 1702.mspx September 17 2002.  Microsoft TechNet Cross-Site Scripting and SQL Code Injection http:\/\/www.microsoft.com\/technet\/community\/chats\/trans\/sql\/sq19 1702.mspx September 17 2002."},{"volume-title":"June 17, 2002.","author":"Harper M.","key":"e_1_3_2_1_11_1"},{"volume-title":"IBM Canada Ltda.","year":"2004","author":"Rjaibi Walid","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Notargiacomo LouAnna Architectures for MLS Database Management Systems http:\/\/www.acsac.org\/secshelf\/book001\/19.pdf  Notargiacomo LouAnna Architectures for MLS Database Management Systems http:\/\/www.acsac.org\/secshelf\/book001\/19.pdf"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/140979.141002"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099604"},{"key":"e_1_3_2_1_16_1","unstructured":"Microsoft MSDN Validating User Input http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/enus\/bldgapps\/ba_highprog_11kk.asp 2006.  Microsoft MSDN Validating User Input http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/enus\/bldgapps\/ba_highprog_11kk.asp 2006."},{"key":"e_1_3_2_1_17_1","unstructured":"Microsoft MS03-016: HTTP Receiver Buffer Overflow and DTA SQL Injection Vulnerabilities in Microsoft BizTalk Server 2002 http:\/\/support.microsoft.com\/default.aspx?scid=kb:en-us:815208 September 2 2004  Microsoft MS03-016: HTTP Receiver Buffer Overflow and DTA SQL Injection Vulnerabilities in Microsoft BizTalk Server 2002 http:\/\/support.microsoft.com\/default.aspx?scid=kb:en-us:815208 September 2 2004"},{"key":"e_1_3_2_1_18_1","unstructured":"Microsoft MSDN \"Patterns and Practices - Chapter 2 - Threats and Countermeasures\" http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/enus\/dnnetsec\/html\/THCMCh02.asp June 2003  Microsoft MSDN \"Patterns and Practices - Chapter 2 - Threats and Countermeasures\" http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/enus\/dnnetsec\/html\/THCMCh02.asp June 2003"},{"key":"e_1_3_2_1_19_1","unstructured":"Finnigan Pete. \"Oracle Security Step-by-Step\". SANS Press 2003.  Finnigan Pete. \"Oracle Security Step-by-Step\". SANS Press 2003."},{"volume-title":"Osborne\/Oracle Press","year":"2001","author":"Theriault Newman","key":"e_1_3_2_1_20_1"},{"volume-title":"Prentice Hall","year":"2004","author":"Skoudis E.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/170088.170122"}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":22,"alternative-id":["10.1145\/1231047.1231060","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231060","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}