Results 31 to 40 of about 8,033 (189)
ДВОРІВНЕВА КОНЦЕПЦІЯ ДЛЯ МОДЕЛЮВАННЯ ЄДИНОЇ ЗАВАДОСТІЙКОЇ ПЕРЕДАЧІ ЦИФРОВИХ ДАНИХ
У статті формалізується, створюється та надається для розглядання концепція єдиного безпечного завадостійкого каналу передачі цифрових даних. У сучасній теорії та практиці з кібербезпеки існує набір рекомендацій по зниженню ризиків для організацій NIST ...
Vladyslav Sharov, Olena Nikulina
doaj +1 more source
This study aims to analyze and improve the security of the SawitGoDigi Palm Oil Harvest Recording Information System using grey-box and white-box testing approaches.
M. Isma Halil, Mansur Mansur
doaj +1 more source
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations [PDF]
Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0-based single sign on. The security of OAuth 2.0 is therefore of critical importance, and it has been widely examined both in ...
C Bansal, DL Dill, E Shernan, W Li, W Li
core +2 more sources
Effective Filter for Common Injection Attacks in Online Web Applications
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective
Santiago Ibarra-Fiallos +5 more
doaj +1 more source
Web engineering security: essential elements [PDF]
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core +1 more source
Continuous Deployment Adoption: Insights From a Public Sector Implementation
ABSTRACT Continuous deployment is a significant trend in software development, yet its adoption and potential benefits within the public sector remain under‐researched. This paper examines a case study of continuous deployment implementation in a public sector project undertaken by Solita, a software development company, for a client utilizing agile ...
Aapo Linjama, Tuomas Granlund
wiley +1 more source
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson +2 more
doaj +1 more source
Technological developments in the field of increasingly advanced computers and networks have caused many organizations to use web applications to provide business services.
Ilham Firman Ashari +3 more
doaj +1 more source
The primary aim of the OWASP Top 10 is to educate developers, designers, architects and organizations about the consequences of the most important web application security weaknesses. The Top 10 provides basic methods to protect against these high risk problem areas –and provides guidance on where to go from here.
openaire +1 more source
Analisis Keretanan Website Dengan Aplikasi Owasp Zap
Website security is often ignored by developers, including small websites or company profile websites that have data that may be stolen by irresponsible parties. Self-test is needed in order to find out security holes that might be attacked. Therefore, a vulnerability assessment is needed to find security holes.
null Abdul Fattah Hasibuan +2 more
openaire +1 more source

