Results 91 to 100 of about 8,371 (231)

Analisa Risiko Pengelolaan Data, Keamanan Sistem, Dan Pengelolaan Vendor TI Di PT. X [PDF]

open access: yes, 2015
Procurement Department in PT. X is a department from a manufacturing company based in Surabaya, it provides needs of all departments in PT. X. Information Technology in Procurement is completely utilized to support the company\u27s business activities ...
Gunawan, I. (Ibnu)   +2 more
core  

So ein Saftladen: IT-Sicherheit in handlungsorientierten Fallbeispielen

open access: yesInformatische Bildung in Schulen
IT-Sicherheit ist ein Thema, das  immer dann in den öffentlichen Diskurs kommt, wenn Systeme gehackt oder anderweitig gestört werden. Auch in den schulischen Lehrplänen gewinnt es zunehmend an Bedeutung.
Reinhild Kokula   +6 more
doaj   +1 more source

Building Robust E-learning Software Systems Using Web Technologies [PDF]

open access: yes
Building a robust e-learning software platform represents a major challenge for both the project manager and the development team. Since functionalities of these software systems improves and grows by the day, several aspects must be taken into ...
Cezar Liviu CERVINSCHI, Diana BUTUCEA
core  

Metodología de validación de herramientas para la seguridad en dispositivos móviles

open access: yesMaskana, 2017
Los usuarios de dispositivos de telefonía móvil celular requieren información actualizada en tiempo real y aplicaciones para satisfacer distintas necesidades.
Daysi Erreyes, Diego Ponce
doaj  

Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications

open access: yesJournal of Cybersecurity and Privacy
The rapid adoption of mobile banking applications has raised significant concerns about their security vulnerabilities. This study presents a comparative vulnerability analysis of mobile banking applications from Thai and non-Thai banks, utilising the ...
Chatphat Titiakarawongse   +4 more
doaj   +1 more source

Сравнительный анализ методик тестов на проникновение [PDF]

open access: yes, 2016
В работе проведен сравнительный анализ методик тестов на проникновение. Целью является выявления сильных и слабых сторон каждой методики. Сформулирована задача разработки методики, соотносящейся с требованиями, выдвигаемыми законодательством ...
Амиров, Николай Гурамович   +1 more
core  

MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj   +1 more source

Enhancing Website Security Using Vulnerability Assessment and Penetration Testing (VAPT) Based on OWASP Top Ten

open access: yesJournal of Applied Informatics and Computing
Website security is one of the main concerns in the digital era, given the increasing potential for cyber threats. This research aims to improve website security by using the Vulnerability Assessment and Penetration Testing (VAPT) method that refers to ...
Diana Rohmaniah   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy