To achieve a satisfactory level of security of an information system, different system and application methods are applied. The paper has a focus on general aspects of application IT security, thereby giving an overview of security methods applied to the web and mobile applications. In accordance with the OWASP report, out of web vulnerabilities the most common include SQL Injection and Cross-site Scripting type of attacks. The paper also emphasizes the role of code analysis tools, which contribute to the detection of vulnerabilities of analyzed application. In the context of mobile applications, Android operating system is especially featured, as one of the most commonly used. The necessary environment and tools for testing the security of...
Industrial Control Systems (ICS) are an essential part of the critical infrastructure of society and...
SWOT analiza je tehnika strateškog planiranja koja se može koristiti za definiranje snage, slabosti,...
We live in the society of World Wide Web, smart mobile devices and social networking, where an indiv...
Intrusion detection (ID) is an area of computer security that involves the detection of unwanted man...
Sigurnosni principi web aplikacija zasnovani su na autentifikaciji, autorizaciji, upravljanju sesijo...
Sigurnost je najkritičnije područje računalne tehnologije te počinje zauzimati izuzetno važnu pozici...
Since the late nineties when there was a revival of the multiplier concept of social networking on t...
Complex real problems increasingly require intelligent systems that combine knowledge, techniques an...
The model of technological pragmatism assumes awareness that technological development involves both...
U vrijeme kada je internet nastajao kao eksperimentalna mreža njegovi programeri sigurnosti umreženi...
Napadi DDOS v dobi informacijskih oblakov predstavljajo veliko grožnjo za gostovane storitve ter pos...
The topics covered in this article are the risks that must be taken into account when developing the...
U posljednje vrijeme Internet se značajno unaprijedio i uvelike poboljšao komunikaciju i poslovanje....
Varnost v informacijskem okolju ni odvisna samo od uporabljenih tehnologij, temveč tudi od vpeljanih...
Nowadays, the rapid development of technology and increased amount of data that must be processed an...
Industrial Control Systems (ICS) are an essential part of the critical infrastructure of society and...
SWOT analiza je tehnika strateškog planiranja koja se može koristiti za definiranje snage, slabosti,...
We live in the society of World Wide Web, smart mobile devices and social networking, where an indiv...
Intrusion detection (ID) is an area of computer security that involves the detection of unwanted man...
Sigurnosni principi web aplikacija zasnovani su na autentifikaciji, autorizaciji, upravljanju sesijo...
Sigurnost je najkritičnije područje računalne tehnologije te počinje zauzimati izuzetno važnu pozici...
Since the late nineties when there was a revival of the multiplier concept of social networking on t...
Complex real problems increasingly require intelligent systems that combine knowledge, techniques an...
The model of technological pragmatism assumes awareness that technological development involves both...
U vrijeme kada je internet nastajao kao eksperimentalna mreža njegovi programeri sigurnosti umreženi...
Napadi DDOS v dobi informacijskih oblakov predstavljajo veliko grožnjo za gostovane storitve ter pos...
The topics covered in this article are the risks that must be taken into account when developing the...
U posljednje vrijeme Internet se značajno unaprijedio i uvelike poboljšao komunikaciju i poslovanje....
Varnost v informacijskem okolju ni odvisna samo od uporabljenih tehnologij, temveč tudi od vpeljanih...
Nowadays, the rapid development of technology and increased amount of data that must be processed an...
Industrial Control Systems (ICS) are an essential part of the critical infrastructure of society and...
SWOT analiza je tehnika strateškog planiranja koja se može koristiti za definiranje snage, slabosti,...
We live in the society of World Wide Web, smart mobile devices and social networking, where an indiv...