Results 211 to 220 of about 8,371 (231)
Some of the next articles are maybe not open access.
Cloud computing security based on OWASP
2022 5th International Conference on Computing and Informatics (ICCI), 2022AbdulAzeez R. Alobaidi, Zinah N. Nuimi
openaire +1 more source
OWASP Top 10 -listan riittävyys kyberturvallisessa verkkosovelluskehityksessä
2023unknown ...
openaire +1 more source
Modeling the OWASP Most Critical WEB Attacks
2018The tremendous growth of the web-based applications has increased information security vulnerabilities over the Internet. The threat landscape of applications security is constantly evolving (see CVE 1. published reports 2.). The key factors in this evolution are the progress made by the attackers, the emergence of new technologies with new weaknesses,
Yassine Ayachi +3 more
openaire +1 more source
OWASP Anleitungen und Tools für Secure SDLC
Datenschutz und Datensicherheit - DuD, 2012Heutzutage ist es ist eine verstandene Wahrheit, dass Sicherheit als Prozess betrachtet werden soll und die erforderlichen Sicherheitsaktivitaten in allen Phasen von Entwicklung integriert werden sollen. In diesem Artikel werden die relevante Anleitungen und Tools, die von OWASP fur Secure SDLC-Prozesse zur Verfugung gestellt werden, in Details ...
openaire +1 more source
OWASP VULNERABILITIES SCANNING OF A PRIVATEUNIVERSITY WEBSITES
Suleyman Demirel University Bulletin Natural and Technical SciencesThe web keeps expanding and attacks continue to go upagainst the web. This paper draws on scanning the private university websitesfor The Open Web Application Security Project (OWASP) and web attackmitigation solutions. Methods for vulnerability scanning as well as mechanismsfor developing web protection will be studied.
N Abdinurova, M Galiyev, A Aitkulov
openaire +1 more source
OWASP Top 10 -haavoittuvuuksien korjaaminen TIM-järjestelmästä
2015unknown ...
openaire +1 more source

