We all know that parameterized SQL is the way to go when dealing with user input and dynamic SQL, but is casting from string to int (or double, or long, or whatever) as effective if the input you are seeking is numeric?
I guess what I am asking is if this technique alone is infallible in regards to SQL injection?