Results 21 to 30 of about 1,346,069 (376)
Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core +3 more sources
Utilizing Object Capabilities to Improve Web Application Security [PDF]
Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform.
Michael Koppmann +3 more
doaj +1 more source
Web Application Penetration Testing Using SQL Injection Attack
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda +4 more
doaj +1 more source
Security Scanner For Web Applications Case Study: Learning Management System
In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities.
Rian Andrian, Ahmad Fauzi
doaj +1 more source
Secure Input for Web Applications [PDF]
The Web is an indispensable part of our lives. Every day, millions of users purchase items, transfer money, retrieve information and communicate over the Web. Although the Web is convenient for many users because it provides any time, anywhere access to information and services, at the same time, it has also become a prime target for miscreants who ...
Martin Szydlowski +2 more
openaire +2 more sources
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj +1 more source
Security in migratory interactive web applications [PDF]
In ubiquitous environments migratory interactive applications allow users to perform their tasks continuously across various devices. Users can push and pull migratory Web applications from one device to another for various reasons. However, the flexibility of such pervasive applications raises various security issues, such as the risk of theft of ...
Ghiani G., Isoni L., Paterno' F.
openaire +4 more sources
The present day environment of cyber-attacks is a threat to even the most secure systems. With each passing day, the attackers are adapting new technologies to infiltrate systems and exploit even the minutest of the vulnerabilities.
Rajeev Kumar +5 more
doaj +1 more source
Application and Web Security [PDF]
As we have explored in earlier chapters, security applies to all the components of the systems including physical infrastructure like building, electricity, cables, and son on; hardware; network; software; tools / utilities; human beings including resources internal to the organization and contractors / suppliers who may be working from within the ...
Umesh Hodeghatta Rao, Umesha Nayak
openaire +2 more sources
-- OWASP (Open Web Application Security Project) version 4 issued by a non-profit organization called owasp.org which is dedicated to the security of web-based applications.
Anggi Elanda, Robby Lintang Buana
semanticscholar +1 more source

