Results 31 to 40 of about 8,266 (204)
Security Support in Continuous Deployment Pipeline [PDF]
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali +4 more
core +2 more sources
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, Daniel Conte De Leon
doaj +1 more source
Mayall:a framework for desktop JavaScript auditing and post-exploitation analysis [PDF]
Writing desktop applications in JavaScript offers developers the opportunity to write cross-platform applications with cutting edge capabilities. However in doing so, they are potentially submitting their code to a number of unsanctioned modifications ...
Bellekens, Xavier +3 more
core +4 more sources
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
The primary aim of the OWASP Top 10 is to educate developers, designers, architects and organizations about the consequences of the most important web application security weaknesses. The Top 10 provides basic methods to protect against these high risk problem areas –and provides guidance on where to go from here.
openaire +1 more source
Analisis Keretanan Website Dengan Aplikasi Owasp Zap
Website security is often ignored by developers, including small websites or company profile websites that have data that may be stolen by irresponsible parties. Self-test is needed in order to find out security holes that might be attacked. Therefore, a vulnerability assessment is needed to find security holes.
null Abdul Fattah Hasibuan +2 more
openaire +1 more source
Vulnerable Open Source Dependencies: Counting Those That Matter
BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies.
Massacci, Fabio +4 more
core +1 more source
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson +2 more
doaj +1 more source
Continuous Deployment Adoption: Insights From a Public Sector Implementation
ABSTRACT Continuous deployment is a significant trend in software development, yet its adoption and potential benefits within the public sector remain under‐researched. This paper examines a case study of continuous deployment implementation in a public sector project undertaken by Solita, a software development company, for a client utilizing agile ...
Aapo Linjama, Tuomas Granlund
wiley +1 more source

