Results 51 to 60 of about 1,899 (129)
Guia bàsica de recomanacions pel desenvolupament d’apps de salut i atenció social [PDF]
Aquesta guia està destinada a totes aquelles persones que desitgin iniciar-se en l’entorn mHealth i vulguin tenir una visió general de quins són els aspectes que cal tenir en compte a l’hora de desenvolupar una aplicació mòbil de l’entorn salut i/o de ...
Alcober Segura, Jesús Ángel +1 more
core +1 more source
Apreciado lector, me es grato presentarle la memoria de labores de la Escuela Especializada en Ingeniería ITCA-FEPADE correspondiente al 2016. Este documento recopila las acciones más destacadas de nuestro quehacer, que nos llenaron de orgullo y que ...
Escuela Especializada en Ingeniería (ITCA-FEPADE)
core +1 more source
The COVID-19 pandemic and remote working did not improve WLAN security. [PDF]
Lindroos S, Hakkala A, Virtanen S.
europepmc +1 more source
Adding web pentesting functionality to PTHelper
Web application pentesting is a crucial component in the offensive cybersecurity area, whose aim is to safeguard web applications and web services as the majority of the web applications are mounted in publicly accessible web environments. This method requires that the cybersecurity experts pretend and act as real attackers to identify all the errors ...
María Olivares-Naya +2 more
openaire +2 more sources
On the privacy of mental health apps: An empirical investigation and its implications for app development. [PDF]
Iwaya LH +3 more
europepmc +1 more source
Towards New Challenges of Modern Pentest
11 pages, 2 figures. Paper presented at World Conference on Smart Trends in Systems, Security, and Sustainability (WorldS4 2023)
Daniel Dalalana Bertoglio +5 more
openaire +2 more sources
Digital onboarding in finance: a novel model and related cybersecurity risks. [PDF]
García MK +6 more
europepmc +1 more source
Penetration Testing and Legacy Systems
As per Adusumilli (2015),'70% of corporate business systems today are legacy applications. Recent statistics prove that over 60% of IT budget is spent on maintaining these Legacy systems, showing the rigidity and the fragile nature of these systems ...
Smyth, Sandra
core
This Master's thesis focuses on the increasing need for organizations to prioritize and maintain continuous security reviews for applications deployed in cloud environments. As more businesses embrace cloud computing, AWS has emerged as a leading provider offering a wide range of services.
openaire +1 more source

