Results 61 to 70 of about 1,346,069 (376)
A Secure Framework for Communication and Data Processing in Web Applications
Web applications are widely used, and the applications deployed on the web do not always satisfy all the security policies. This may arise due to less secure configurations, less knowledge in security configurations, or due to insecure coding practices ...
Suprakash Sudarsanan Nair +1 more
doaj +1 more source
Web Application Security Tools Analysis
Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Dealing with web application or website security issues requires deep insight and planning,
Abdulrahman Alzahrani +4 more
semanticscholar +1 more source
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, D. Leon
semanticscholar +1 more source
The fabrication of a cellularized, multilayered 3D printed cylindrical model comprising hybrid bioinks inspired by the natural extracellular environment as an approach to artery mimetics, is presented. Using embedded bioprinting, interlayer crosslinking of self‐supporting concentric cylinders is achieved.
Uxue Aizarna‐Lopetegui +7 more
wiley +1 more source
Security and computer forensics in web engineering education [PDF]
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core
Security For Three-Tiered Web Application
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing
Wisal H. Abdulsalam
doaj
This review explores Zn anode challenges in aqueous ZIBs, including dendrites, corrosion, and side reactions, and discusses strategies for improvement through Zn anode, electrolyte, and separator modifications to enhance stability and efficiency. Abstract Aqueous rechargeable zinc‐ion batteries (ZIBs) are emerging as promising candidates for next ...
Pragati A. Shinde +5 more
wiley +1 more source
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer +7 more
core +1 more source
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel +3 more
core +2 more sources
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai +8 more
wiley +1 more source

