2[1]Kost S.Introduction to SQL Injection Attacks for Oracle Developers[EB/OL].Integrigy Corporation,2004[2006-10-23].http://www.net-security.org/dl/articles/IntegrigyIntrotoSQLInjectionAttacks.pdf.
3[2]Anley C.Advanced SQL Injection In SQL Server Applications[EB/OL].An NGSSoftware Insight Security Research(NISR),2002[2006-10-23].Publication,http://www.ngssoftware.com/papers/advanced_sql_injection.pdf.
4[3]Anley C.(more)Advanced SQL Injection[EB/OL].An NGSSoftware Insight Security Research (NISR)Publication,2002[2006-10-23].http://www.ngssoftwamcom/papers/more_advanced_sql_injection.pdf.
5[4]Cerrudo C.Manipulating Microsoft SQL Server Using SQL Injection[EB/OL].2002[2006-10-23].http://www.appsecinc.com/presentations/Manipulating_SQL_Server_Using__SQL_Injection.pdf.