Results 21 to 30 of about 8,033 (189)
Web application security faces increasingly complex challenges as digital architectures evolve, necessitating the selection of appropriate and effective penetration testing methods.
Muhamad Bunan Imtias +3 more
doaj +1 more source
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
The powerful Open Web Application Security Project (OWASP)-Zed Attack Proxy (ZAP) tool secures web applications with extensive security testing. Its main goal is to find and fix web application vulnerabilities before they can be exploited. The goal is to
S. P. Maniraj +2 more
doaj +1 more source
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, Daniel Conte De Leon
doaj +1 more source
Escrow: A large-scale web vulnerability assessment tool [PDF]
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core +2 more sources
WAF ЗАХИСТУ ВНУТРІШНІХ СЕРВІСІВ У СТРУКТУРІ ZERO TRUST
Сучасний світ висуває високі вимоги до IT-інфраструктури та комп’ютерних мереж підприємств, що обумовлює складність їх структур. Чим складніша структура і кількість ланок, що входять до неї, тим вища імовірність появи вразливих місць.
Valerii Lakhno +5 more
doaj +1 more source
The Rocket Car Wash Semarang application operates using a microservice architecture that handles sensitive information such as user identity data, transaction history, and vehicle details.
Indra Gamayanto +2 more
doaj +1 more source
ABSTRAK Pada universitas, website dibangun sebagai jendela informasi elektronik yang menyediakan informasi tentang pendidikan tinggi. Namun, adanya celah keamanan pada website berpotensi untuk dieksploitasi bagi kriminal teknologi informasi. Berdasarkan
RIZAL MUNADI +3 more
doaj +1 more source
Peningkatan Sistem Keamanan Website Menggunakan Metode OWASP
Layanan website itu telah menjadi sebuah Cross-Platform yang paling sering digunakan oleh setiap orang mendapatkan informasi yang ada yang dibutuhkan. Website merupakan situs yang di publikasikan di internet dan dapat diakses oleh semua pengguna internet, sehingga sistem keamanan sangat penting untuk menjaga website tetap aman terhadap ancaman ancaman ...
Hermanto Hermanto, Haeruddin Haeruddin
openaire +1 more source
Vulnerable Open Source Dependencies: Counting Those That Matter
BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies.
Massacci, Fabio +4 more
core +1 more source
Security Support in Continuous Deployment Pipeline [PDF]
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali +4 more
core +2 more sources

