Results 171 to 180 of about 8,266 (204)
Some of the next articles are maybe not open access.

Cloud computing security based on OWASP

2022 5th International Conference on Computing and Informatics (ICCI), 2022
AbdulAzeez R. Alobaidi, Zinah N. Nuimi
openaire   +1 more source

Modeling the OWASP Most Critical WEB Attacks

2018
The tremendous growth of the web-based applications has increased information security vulnerabilities over the Internet. The threat landscape of applications security is constantly evolving (see CVE 1. published reports 2.). The key factors in this evolution are the progress made by the attackers, the emergence of new technologies with new weaknesses,
Yassine Ayachi   +3 more
openaire   +1 more source

OWASP Anleitungen und Tools für Secure SDLC

Datenschutz und Datensicherheit - DuD, 2012
Heutzutage ist es ist eine verstandene Wahrheit, dass Sicherheit als Prozess betrachtet werden soll und die erforderlichen Sicherheitsaktivitaten in allen Phasen von Entwicklung integriert werden sollen. In diesem Artikel werden die relevante Anleitungen und Tools, die von OWASP fur Secure SDLC-Prozesse zur Verfugung gestellt werden, in Details ...
openaire   +1 more source

Prioritizing CWE/SANS and OWASP Vulnerabilities: A Network-Based Model

International Journal of Computing and Digital Systems, 2021
Basim Mahmood
exaly  

OWASP VULNERABILITIES SCANNING OF A PRIVATEUNIVERSITY WEBSITES

Suleyman Demirel University Bulletin Natural and Technical Sciences
The web keeps expanding and attacks continue to go upagainst the web. This paper draws on scanning the private university websitesfor The Open Web Application Security Project (OWASP) and web attackmitigation solutions. Methods for vulnerability scanning as well as mechanismsfor developing web protection will be studied.
N Abdinurova, M Galiyev, A Aitkulov
openaire   +1 more source

OWASP Enterprise Security API

Datenschutz und Datensicherheit - DuD, 2012
openaire   +1 more source

Home - About - Disclaimer - Privacy