Umfassende Service-Einschränkungen im Bereich Ausleihe ab 17. März!

Treffer 61 - 80 von 268

61

Securing Web Applications with Secure Coding Practices and Integrity Verification
Anis, Arafa ; Zulkernine, Mohammad ; Iqbal, Shahrear ; et al.
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) DASC-PICOM-DATACOM-CYBERSCITECH Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2018 IEEE 16th Intl. :618-625 Aug, 2018

Konferenz
Zu den Favoriten
62

Implementing dynamic certificates for securing database
Gautam, Kiran ; Upadhyay, Divya
2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence) Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference -. :919-922 Sep, 2014

Konferenz
Zu den Favoriten
63

SBSQLID: Securing Web Applications with Service Based SQL Injection Detection
Shanmughaneethi, Shri V. ; Shyni, Smt C. Emilin ; Swamynathan, S.
2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT '09. International Conference on. :702-704 Dec, 2009

Konferenz
Zu den Favoriten
64

A multilevel system to mitigate DDOS, brute force and SQL injection attack for cloud security
Patil, Ajit ; Laturkar, Aishwarya ; Athawale, S. V. ; et al.
2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC) Information, Communication, Instrumentation and Control (ICICIC), 2017 International Conference on. :1-7 Aug, 2017

Konferenz
Zu den Favoriten
65

A novel method for preventing SQL injection using SHA-1 algorithm and syntax-awareness
Temeiza, Qais ; Temeiza, Mohammad ; Itmazi, Jamil
2017 Joint International Conference on Information and Communication Technologies for Education and Training and International Conference on Computing in Arabic (ICCA-TICET) Information and Communication Technologies for Education and Training and International Conference on Computing in Arabic (ICCA-TICET), 2017 Joint International Conference on. :1-4 Aug, 2017

Konferenz
Zu den Favoriten
66

Towards a Secure Web-Based Smart Homes
Al-Syouf, Raghad ; Al-Duwairi, Basheer ; Shatnawi, Ahmad S.
2021 12th International Conference on Information and Communication Systems (ICICS) Information and Communication Systems (ICICS), 2021 12th International Conference on. :195-200 May, 2021

Konferenz
Zu den Favoriten
67

Log Visualization of Intrusion and Prevention Reverse Proxy Server against Web Attacks
Mantoro, Teddy ; Aziz, Normaziah binti Abdul ; Yusoff, Nur Dalilah binti Meor ; et al.
2013 International Conference on Informatics and Creative Multimedia Informatics and Creative Multimedia (ICICM), 2013 International Conference on. :325-329 Sep, 2013

Konferenz
Zu den Favoriten
68

Securing PHP Web Applications
Tricia Ballad ; William Ballad ; Tricia Ballad ; et al.

E-Book
Zu den Favoriten
69

Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Gupta, Mukesh Kumar ; Govil, M.C. ; Singh, Girdhari
International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014) Recent Advances and Innovations in Engineering (ICRAIE), 2014. :1-5 May, 2014

Konferenz
Zu den Favoriten
70

Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
Muthuprasanna, M. ; Ke Wei ; Kothari, S.
2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06) Web Site Evolution, 2006. WSE '06. Eighth IEEE International Symposium on. :22-32 Sep, 2006

Konferenz
Zu den Favoriten
71

Enhancing Mysql Injector vulnerability checker tool (Mysql Injector) using inference binary search algorithm for blind timing-based attack
Liban, Abdilahi ; Hilles, Shadi M.S.
2014 IEEE 5th Control and System Graduate Research Colloquium Control and System Graduate Research Colloquium (ICSGRC), 2014 IEEE 5th. :47-52 Aug, 2014

Konferenz
Zu den Favoriten
72

Network-based Active Defense for Securing Cloud-based Healthcare Data Processing Pipelines
Akashe, Vaibhav ; Neupane, Roshan Lal ; Alarcon, Mauro Lemus ; et al.
2021 International Conference on Computer Communications and Networks (ICCCN) Computer Communications and Networks (ICCCN), 2021 International Conference on. :1-9 Jul, 2021

Konferenz
Zu den Favoriten
73

Flexible and publicly verifiable aggregation query for outsourced databases in cloud
Yuan, Jiawei ; Yu, Shucheng
2013 IEEE Conference on Communications and Network Security (CNS) Communications and Network Security (CNS), 2013 IEEE Conference on. :520-524 Oct, 2013

Konferenz
Zu den Favoriten
74

Automated multilevel defence model to investigate packets for web interface
Verma, Seema ; Singh, Tanya
2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN) Wireless and Optical Communications Networks (WOCN), 2012 Ninth International Conference on. :1-6 Sep, 2012

Konferenz
Zu den Favoriten
75
76

Securing the database.
Hammond, Mark
PC Week. 08/31/98, Vol. 15 Issue 35, p3. 1/3p.

SQL COMPUTER software DATABASE security softwa... DBSECURE Inc. BRAINTREE Security Softw...
Zeitschrift
Zu den Favoriten
77

Cybersecurity Essentials
Charles J. Brooks ; Christopher Grow ; Philip A. Craig, Jr. ; et al.

Buch
Zu den Favoriten
78

A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications
Sher, Muhammad ; Magedanz, Thomas
Computer Networks. Nov2007, Vol. 51 Issue 16, p4697-4709. 13p.

COMPUTER network securit... SECURITY systems industr... DATABASE management RELATIONAL databases
Fachzeitschrift
Zu den Favoriten
79

Learning Oracle PL/SQL
Pribyl, Bill ; Feuerstein, Steven ; Pribyl, Bill ; et al.

PL/SQL (Computer program...
E-Book
Zu den Favoriten
80

Securing web applications from SQLIA using progressive detector
N. Gunaseeli ; D. Jeya Mala
Inderscience Enterprises Ltd, International Journal of Information Systems and Change Management. 9(1):44-69

Fachzeitschrift
Zu den Favoriten

Filter