Add input validation in this manner.
以下面的方式添加输入验证。
These tags handle input validation before the form is saved.
这些标签负责在保存表单之前对输入信息进行有效性验证。
Listing 37 has the input validation rules for the above form.
清单37包含上述表单的输入验证规则。
The first conditional statement is used for input validation.
第一个条件陈述式用于输入验证。
Languages like PHP have a wide range of input validation functions.
php之类的语言有很多输入验证函数。
Listing 5 has the input validation rules for the form in Listing 4.
清单5为清单4中的表单提供了输入验证规则。
For our input validation, change validation.xml using the following code.
对于我们的输入验证,请使用以下代码来修改validation . xml。
You may have heard the term input validation in your programming experience.
在您的编程经历中可能听说过术语:输入验证。
Therefore, input validation is the first step toward protecting Web applications.
因此,要保护Web应用程序,第一步需要添加输入验证。
SQL injection vulnerabilities are yet another class of input validation flaws.
SQL注入攻击是另一种输入验证上的漏洞。
So prototypes help and augment input validation, but are no substitute for it.
所以原型帮助增强输入验证,但并不能替代它。
It provides functionality to handle common tasks such as input validation and exception handling.
它提供处理普通任务的功能,比如输入验证和异常处理。
Provide form validation: Input validation is one of the biggest headaches for both developers and users.
提供表单验证:输入验证是开发人员和用户都十分头痛的问题。
This problem is actually a special case of a much larger class of problems related to user input validation.
这个问题实际上是与用户输入验证相关的一类更大问题的一个特例。
Any errors arising through the input validation process are raised as instances of the Example_Exception class.
在输入验证过程中发生的任何错误都会产生一个example_exception类的实例。
The commands provide input validation, helping to ensure that any changes to the configuration model are correct.
该命令可提供输入验证,从而有助于确保对配置模型的任何更改都正确无误。
Customize a checklist of the input validation, which contains validation to integer, float, text, date, etc. (See Figure 11.)
制定一个输入确认的清单,它包括对精确数值、浮标、文本、数据等的确认(请看图11)。
Such remedies as input validation and HTML escaping are a start, but they must be applied at all application points that accept data.
诸如输入验证和HTML转义这样的补救措施只是个开始,但必须将它们应用到接受数据的应用程序点。
Multiple input validation methods and effective(verification) approaches which can reduce data error are adopted in the software.
采用多种输入校验方法和有效性验证技术,减少输入错误;
ModSecurity can be used for manually creating security filters, identifying attacks and implementing positive security input validation.
我们可以通过ModSecurity手工创建安全过滤器、定义攻击并实现主动的安全输入验证。
Without input validation rules, it is easy for the hacker to manipulate a query string so he can shut down the online collaboration Web page.
没有输入确认规则,黑客就很容易操作一条查询字符串,于是能关闭在线协作Web 页面。
In a similar vein, update the SearchErrorView to return an XML-encoded error message in case of an error in input validation or query execution.
以类似的方式更新SearchErrorView,以便在输入验证或查询执行中出现错误时返回一个XML编码的错误消息。
We didn't have early planning for input validation, and very quickly realized this was a real problem. The following issues emphasized the problem.
早先我们没有为输入确认制定计划,很快我们意识到这是个真正的问题。
You'll again want to re-construct the query example with strong input validation rules and ensure the hacker cannot log in with his malicious userid.
您又将需要利用有力的输入确认规则来重构查询示例,并确保黑客不能使用恶意userid登录。
To get rid of this vulnerability, you can either perform input validation or ensure that user-submitted data is always HTML-escaped before displaying it.
要消除这种漏洞,可以执行输入验证,或者确保用户所提交的数据总是在显示之前已被html转义。
We will use the input validation provided by Struts to ensure that a user does actually enter a user id and password when attempting to login to the application.
我们将使用Struts提供的输入验证以确保用户在试图登录到应用程序时确实真正地输入了用户标识和密码。
JSF has built-in support for common UI concerns such as component state management, event handling, navigation, user-input validation, and internationalization.
JSF为常见的UI问题提供了内置支持,比如组件状态管理、事件处理、导航、用户输入检验和国际化。
To prevent the hacker from exploiting the vulnerability, not only must you re-construct the query example with input validation, you must also ensure the hacker cannot log in.
要防止黑客利用该漏洞,您不仅必须重构带有输入确认的查询示例,还必须确保黑客不能登录。
Here is how an SQL injection works: First, assume an SQL statement accepts user-supplied data to look up a team member's contact information from a database without input validation rules.
下面是SQL注入的工作方式:首先,假设一条sql语句接受用户提供的数据,没有输入确认规则就可在数据库中查找团队成员的联系信息。
Here is how an SQL injection works: First, assume an SQL statement accepts user-supplied data to look up a team member's contact information from a database without input validation rules.
下面是SQL注入的工作方式:首先,假设一条sql语句接受用户提供的数据,没有输入确认规则就可在数据库中查找团队成员的联系信息。
应用推荐