Results 291 to 300 of about 1,062,697 (366)

Development of an e-Health Software for Speech and Swallowing Rehabilitation Following Laryngectomy. [PDF]

open access: yesLaryngoscope Investig Otolaryngol
Gugatschka M   +6 more
europepmc   +1 more source

Biodepot Launcher: an app to install, manage and launch bioinformatics workflows. [PDF]

open access: yesGigaByte
Hung LH   +5 more
europepmc   +1 more source

A Novel Web-Based Application for Influenza and COVID-19 Outbreak Detection and Response in Residential Aged Care Facilities.

open access: yesJMIR Public Health Surveill
Hsiao KH   +7 more
europepmc   +1 more source

Implementation and analysis of Web application security measures using OWASP Guidelines

2022 International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC), 2022
Web application security is the most important area when it comes to developing a web application. Many web applications having vulnerabilities due to poor implementation of security measures.
S. A. Kumar, Y. U. Rani
semanticscholar   +1 more source

Analysis of Web Security Using Open Web Application Security Project 10

2020 8th International Conference on Cyber and IT Service Management (CITSM), 2020
Open Web Application Security Project 10 is a web application security testing framework method that focuses on web application security to find weaknesses in a website.
Muhamad Agreindra Helmiawan   +5 more
semanticscholar   +1 more source

Improving Security of Web-Based Application Using ModSecurity and Reverse Proxy in Web Application Firewall

International Workshop on Big Data and Information Security, 2020
The use of web applications has been undergoing rapid increase. Many individuals, groups, organizations or governments use web applications as a means to exchange information or support business-related tasks.
Rizki Agung Muzaki   +3 more
semanticscholar   +1 more source

Web Application Security [PDF]

open access: possible, 2002
Security is a contentious issue for Web applications, with developers and administrators sharing overall responsibility, while still focusing on their specialist abilities. As a developer, you need to consider tasks such as user authentication, authorization, and impersonation; you also need to produce a model that the administrators can use when the ...
Rob Macdonald, Steve Harris
openaire   +1 more source

Home - About - Disclaimer - Privacy