Results 91 to 100 of about 8,033 (189)
Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications
The rapid adoption of mobile banking applications has raised significant concerns about their security vulnerabilities. This study presents a comparative vulnerability analysis of mobile banking applications from Thai and non-Thai banks, utilising the ...
Chatphat Titiakarawongse +4 more
doaj +1 more source
Building Robust E-learning Software Systems Using Web Technologies [PDF]
Building a robust e-learning software platform represents a major challenge for both the project manager and the development team. Since functionalities of these software systems improves and grows by the day, several aspects must be taken into ...
Cezar Liviu CERVINSCHI, Diana BUTUCEA
core
Analisa Risiko Pengelolaan Data, Keamanan Sistem, Dan Pengelolaan Vendor TI Di PT. X [PDF]
Procurement Department in PT. X is a department from a manufacturing company based in Surabaya, it provides needs of all departments in PT. X. Information Technology in Procurement is completely utilized to support the company\u27s business activities ...
Gunawan, I. (Ibnu) +2 more
core
MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj +1 more source
Website security is one of the main concerns in the digital era, given the increasing potential for cyber threats. This research aims to improve website security by using the Vulnerability Assessment and Penetration Testing (VAPT) method that refers to ...
Diana Rohmaniah +3 more
doaj +1 more source
Сравнительный анализ методик тестов на проникновение [PDF]
В работе проведен сравнительный анализ методик тестов на проникновение. Целью является выявления сильных и слабых сторон каждой методики. Сформулирована задача разработки методики, соотносящейся с требованиями, выдвигаемыми законодательством ...
Амиров, Николай Гурамович +1 more
core
Analisis Keamanan Web Samsat Menggunakan Metode OWASP
Terdapat situs web tempat masyarakat dapat berkomunikasi dan bertukar informasi antara pemerintah dan masyarakat umum. Website adalah suatu jenis media yang berisi informasi yang dapat diakses dari mana saja melalui internet dan dapat diakses dari mana saja di dunia.
Zarifah Aina Zulfan +2 more
openaire +1 more source
We present a real-world dataset capturing thirty consecutive days of malicious HTTP traffic filtered and blocked by the OWASP ModSecurity Web Application Firewall (WAF) on a live production server.
Geza Lucz, Bertalan Forstner
doaj +1 more source
Deploying Secure Web Applications with OWASP Resources [PDF]
Secure applications do not just happen – they are the result of an organization deciding that they will produce secure applications. OWASP’s does not wish to force a particular approach or require an organization to pick up compliance with laws that do not affect them as every organization is different.
openaire +1 more source
Web application security is a critical aspect of modern cybersecurity, necessitating efficient and reliable vulnerability detection mechanisms. This study presents a quantitative analysis of unique web application vulnerabilities detected by four ...
Zogaj Gani +3 more
doaj +1 more source

