2 research outputs found

    Prevention and Detection Techniques for SQL Injection Attacks

    Get PDF
    Abstract-: Different kind of Web Application run with help of web server using World Wide Web protocol and many of web application could be vulnerable with SQL Injection attacks this is the type of input validation attacks. Using this type of attacks, web application could be hacked easily and steal the confidential data by the anonymous user. This may be dangerous for organization market value

    Immune thrombocytopenic purpura in a patient with disseminated tuberculosis: An unusual presentation

    No full text
    Pulmonary tuberculosis can have a wide variety of presentations including hematological manifestations. We report a case of a young male patient who presented with complaints of generalized petechiae, gum bleeding, systemic lymphadenopathy, and severe thrombocytopenia. His bone marrow revealed normal megakaryocytes, and in the absence of hepatosplenomegaly, a diagnosis of immune thrombocytopenic purpura (ITP) was made. The thrombocytopenia responded to course of intravenous immune globulin. The smear made from fine-needle aspiration of cervical lymph nodes showed acid-fast bacilli. This case highlights the rare association of extrapulmonary tuberculosis with ITP
    corecore