Results 151 to 160 of about 8,274 (262)
Building Robust E-learning Software Systems Using Web Technologies [PDF]
Building a robust e-learning software platform represents a major challenge for both the project manager and the development team. Since functionalities of these software systems improves and grows by the day, several aspects must be taken into ...
Cezar Liviu CERVINSCHI, Diana BUTUCEA
core
Ampliación del entorno OWASP WebGoat
Los fallos de seguridad en aplicaciones software pueden causar funcionamientos erróneos no deseados, que causen daños económicos y jurídicos para los propietarios y usuarias de estas, puesto que gestionan información confidencial crítica que debe ser protegida.
openaire +2 more sources
OWASP FOR ARTIFICIAL INTELLIGENCE (AI) AND MACHINE LEARNING (ML)
The rapid adoption of artificial intelligence (AI) and machine learning (ML) technologies across various sectors has brought both unprecedented opportunities and significant security challenges. As these systems increasingly influence critical decisions in healthcare, finance, and autonomous systems, understanding their vulnerabilities becomes ...
М. Myhun, V. Liedniei
openaire +2 more sources
Vulnerability Assessment Website E-Government dengan NIST SP 800-115 dan OWASP Menggunakan Web Vulnerability Scanner [PDF]
Esti Zakia Darojat+2 more
openalex +1 more source
Dissecting contact tracing apps in the Android platform [PDF]
Kouliaridis V+4 more
europepmc +2 more sources
Penerapan Tanda Tangan Digital dan Secure Coding berdasarkan OWASP pada Sistem E-Control Tugas Akhir
Teknologi sangat penting dalam kehidupan manusia. Dalam bidang pendidikan, teknologi dapat mempermudah proses pendidikan. Salah satu manfaat teknologi dalam pendidikan adalah sistem e-control tugas akhir.
Dhana Arvina Alwan, Nurul Qomariasih
semanticscholar +1 more source
Developer-oriented Web Security by Integrating Secure SDLC into IDEs
Enterprises and organizations have difficulties to protect their web-based services against cyber-attacks. Due to increasing number of cyber-attacks, critical data including customer data, patient data etc.
Emin İslam Tatlı
doaj
Prioritizing CWE/SANS and OWASP Vulnerabilities: A Network-Based Model [PDF]
openaire +2 more sources