Results 61 to 70 of about 1,234 (145)
Analisis Dan Mitigasi Celah Keamanan Website SIMPKN Informatika Menggunakan Metode Owasp Zed Attack Proxy (ZAP) [PDF]
In today's technological developments, there are a variety of conveniences in processing information data that make it easier for every individual to build a website.
Perdhana, Helmi Indra
core
Automatic information security tests on a public cloud [PDF]
Denne rapporten beskriver resultatene av prosjektet Automatic Information Security on a Public Cloud. Produktets intensjon er å forbedre den generelle informasjonssikkerheten på applikasjoner utviklet av Telia, samt reduserer tiden utviklere bruker på ...
Holt-Seeland, Per, Olsen, Mathias
core
Automating Virtual Patching via Application Security Testing Tools [PDF]
Webapplikasjonsbrannmurer (WAF) har blitt stadig mer populært som et resultat av organisasjoners behov for å beskytte webapplikasjonene og tjenestene deres.
Orlando, Kyle Richard
core
Metode Vulnerability Assesment Dalam Pengujian Kinerja Sistem Keamanan Website Points of Sales
Perkembangan perdagangan elektronik melalui website berbasis point of sales terkait erat dengan tingkat pertumbuhan internet, karena perdagangan elektronik berjalan melalui jaringan dan koneksi Internet. Namun, semakin banyaknya website berbasis point of
Wahyudin Wahyudin +3 more
doaj +1 more source
Final project management in D3 Telecommunication Engineering requires an integrated and secure system to ensure the smooth running of the final project management process and the protection of academic data.
Dewi Vista Oktaviani Napitupulu +2 more
doaj +1 more source
Systematic Literature Review: Security Gap Detection On Websites Using Owasp Zap
This research highlights the detection of security vulnerabilities on websites using OWASP ZAP, a highly regarded open-source web security testing tool. Through a comprehensive literature review approach and systematic research methodology, this research emphasizes the urgency of addressing the ever-evolving security threats in web systems.
Fauzan Prasetyo Eka Putra +4 more
openaire +1 more source
The employee attendance process at Bekangdam I/Bukit Barisan was previously conducted manually, which created potential problems such as recording errors, data loss, and delays in generating attendance reports.
Prawira Maulana Ilham +2 more
doaj +1 more source
Evaluation of Web vulnerability scanners based on OWASP benchmark [PDF]
Web applications have become an integral part of everyday life, but many of these applications are deployed with critical vulnerabilities that can be fatally exploited.
Mburano, Balume
core
KAJIAN LITERATUR : METODE PENGUJIAN KEAMANAN SISTEM APLIKASI BERBASIS WEB [PDF]
This document discusses the importance of information system security in the digital era, where much data and information is stored in website-based applications.
Besse Hartati +2 more
core +2 more sources
The rapid adoption of e-government systems has increased the exposure of government web applications to cybersecurity threats with the lack of security-focused implementation.
Arizal +2 more
doaj +1 more source

