SQL Injection Explained: Protect Your Data from Cyber Attacks