Results 281 to 290 of about 781,799 (337)
Digital Health Interventions to Support Chronic Disease Management: Systematic Scoping Review.
Al Mahmud A +10 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
South Florida Journal of Development, 2022
This study aims to show how security flaws of web applications can threat information security. Web Application Security is a branch of Information Security which focuses on web application level security flaws and their solutions. Evolution of Web continues with a big momentum.
Buket Erşahin, Mustafa Erşahin
openaire +1 more source
This study aims to show how security flaws of web applications can threat information security. Web Application Security is a branch of Information Security which focuses on web application level security flaws and their solutions. Evolution of Web continues with a big momentum.
Buket Erşahin, Mustafa Erşahin
openaire +1 more source
2022
Web-based services are common targets for hackers, and the need for ensuring their security keeps on rising. Attackers often take advantage of the vulnerabilities of different web applications using several mechanisms and thus steal and manipulate valuable information.
Siva Prasad Reddy Katamreddy +1 more
openaire +2 more sources
Web-based services are common targets for hackers, and the need for ensuring their security keeps on rising. Attackers often take advantage of the vulnerabilities of different web applications using several mechanisms and thus steal and manipulate valuable information.
Siva Prasad Reddy Katamreddy +1 more
openaire +2 more sources
The International Conference on Security, Fault Tolerance, Intelligence, 2023
In der heutigen Zeit spielt die Absicherung von modernen IT-Systemen eine wichtige Rolle und stellt gleichzeitig eine Herausforderung für viele Unternehmen dar. Bei den Versuchen, strikte Richtlinien umzusetzen und die eigenen Daten zu schützen, stoßen einige davon an ihre Grenzen.
openaire +3 more sources
In der heutigen Zeit spielt die Absicherung von modernen IT-Systemen eine wichtige Rolle und stellt gleichzeitig eine Herausforderung für viele Unternehmen dar. Bei den Versuchen, strikte Richtlinien umzusetzen und die eigenen Daten zu schützen, stoßen einige davon an ihre Grenzen.
openaire +3 more sources
2011
This chapter covers web applications and their associated security mechanisms. You will audit web applications and identify vulnerabilities from a user’s (or adversary’s), a maintainer’s and a developer’s perspective. You will exploit the vulnerabilities and see their consequences.
David Basin +2 more
openaire +2 more sources
This chapter covers web applications and their associated security mechanisms. You will audit web applications and identify vulnerabilities from a user’s (or adversary’s), a maintainer’s and a developer’s perspective. You will exploit the vulnerabilities and see their consequences.
David Basin +2 more
openaire +2 more sources
International Journal of Applied Research on Information Technology and Computing, 2014
In today's world, web applications are used for sharing information and servicing delivery over the Internet. As their use is increasing day by day for critical services, web applications become a popular and valuable target for security attacks. Although a large number of techniques have been developed to fortify web applications and mitigate the ...
Kavita Yadav +2 more
openaire +1 more source
In today's world, web applications are used for sharing information and servicing delivery over the Internet. As their use is increasing day by day for critical services, web applications become a popular and valuable target for security attacks. Although a large number of techniques have been developed to fortify web applications and mitigate the ...
Kavita Yadav +2 more
openaire +1 more source
Information Security Technical Report, 2008
Web application vulnerabilities have become a major concern in software security. We will present major attack patterns, i.e. SQL injection, cross-site scripting, cross-site request forgery, JavaScript hijacking, and DNS rebinding, together with a survey and assessment of the countermeasures available to web application developers.
openaire +1 more source
Web application vulnerabilities have become a major concern in software security. We will present major attack patterns, i.e. SQL injection, cross-site scripting, cross-site request forgery, JavaScript hijacking, and DNS rebinding, together with a survey and assessment of the countermeasures available to web application developers.
openaire +1 more source
2003
For many Web sites security is a primary concern. This is certainly no less true for a Java J2EE Web application (and is probably even more true!). Traditionally, security for such Web sites has been controlled either programmatically by the developer or by the Web server.
John Hunt, Chris Loftus
openaire +1 more source
For many Web sites security is a primary concern. This is certainly no less true for a Java J2EE Web application (and is probably even more true!). Traditionally, security for such Web sites has been controlled either programmatically by the developer or by the Web server.
John Hunt, Chris Loftus
openaire +1 more source
Securing collaborative Web applications
International Conference on Education and e-Learning Innovations, 2012With the expansion of Web servers and cloud infrastructures, collaborative Web applications are increasingly used. For instance, the e-learning is a field where students, tutors and professors share remote electronic resources and processing. Nevertheless, interference between information may occur that is data can illicitly flow to not authorized ...
Manel Ameur, Takoua Abdellatif
openaire +1 more source
2002
Security is a contentious issue for Web applications, with developers and administrators sharing overall responsibility, while still focusing on their specialist abilities. As a developer, you need to consider tasks such as user authentication, authorization, and impersonation; you also need to produce a model that the administrators can use when the ...
Steve Harris, Rob Macdonald
openaire +1 more source
Security is a contentious issue for Web applications, with developers and administrators sharing overall responsibility, while still focusing on their specialist abilities. As a developer, you need to consider tasks such as user authentication, authorization, and impersonation; you also need to produce a model that the administrators can use when the ...
Steve Harris, Rob Macdonald
openaire +1 more source

