Our text discusses SQL injection attacks. Consider a No SQL database, is it still vulnerable to an SQL injection attack? Why or why not? What are the vulnerabilities associated with a No SQL database?
You must include at least one scholarly citation. This is not a “book report”, So please use your citation to underpin your understanding of the subject matter but do not simply summarize your source.