Information security and security testing is important for software companies because even if their own information has not been compromised one bad news about badly implemented security can cause irreparable affects to market value and future sales. Standalone vulnerability scanners can be used to implement security testing easily but real effectiveness and functionality how they work remain in the dark if the security tester does not know enough about penetrations testing, technologies used in the software and methods that is used to reveal vulnerabilities. A Finnish software company M-Files has developed M-files Web Service that is REST like HTTP API for communicating between their document management system and client applications for...
Penetration testing is one of the methods to evaluate the security of computer system or network. P...
Oulu University of Applied Sciences Degree programme in Information Technology Author: Samir Kumar...
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the ro...
Information security and security testing is important for software companies because even if their ...
The purpose of this thesis was to evaluate the security of the commissioners web application by cond...
In this thesis security issues faced by modern web applications are studied. The goal is to find wa...
Turvatestimine on tarkvara testimise haru, mille eesmärgiks on kontrollida, kas tarkvara on haavatav...
Web-sovellukset ovat suosittu kohde pahansuoville hyökkäyksille. Yleisissä web-sovelluksista voi löy...
The current state of WebSocket is not an exception when it comes to security issues in traditional w...
Application programming interfaces (API) are components that facilitate communication between other ...
Läbistustestimine on reaalsete veebirünnakute simulatsioon, et hinnata turvaaukudest tulenevaid pote...
Tietoturva on nousemassa yhä tärkeämmäksi osaksi web-sovellusten kehitystä ja myyntiä. Euroopan unio...
During the past decade, web applications have become the most prevalent way for service delivery ove...
As web services have become business critical components, it is very vital to improve their security...
Today, new web applications are made every single day with increasingly more sensitive data to manag...
Penetration testing is one of the methods to evaluate the security of computer system or network. P...
Oulu University of Applied Sciences Degree programme in Information Technology Author: Samir Kumar...
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the ro...
Information security and security testing is important for software companies because even if their ...
The purpose of this thesis was to evaluate the security of the commissioners web application by cond...
In this thesis security issues faced by modern web applications are studied. The goal is to find wa...
Turvatestimine on tarkvara testimise haru, mille eesmärgiks on kontrollida, kas tarkvara on haavatav...
Web-sovellukset ovat suosittu kohde pahansuoville hyökkäyksille. Yleisissä web-sovelluksista voi löy...
The current state of WebSocket is not an exception when it comes to security issues in traditional w...
Application programming interfaces (API) are components that facilitate communication between other ...
Läbistustestimine on reaalsete veebirünnakute simulatsioon, et hinnata turvaaukudest tulenevaid pote...
Tietoturva on nousemassa yhä tärkeämmäksi osaksi web-sovellusten kehitystä ja myyntiä. Euroopan unio...
During the past decade, web applications have become the most prevalent way for service delivery ove...
As web services have become business critical components, it is very vital to improve their security...
Today, new web applications are made every single day with increasingly more sensitive data to manag...
Penetration testing is one of the methods to evaluate the security of computer system or network. P...
Oulu University of Applied Sciences Degree programme in Information Technology Author: Samir Kumar...
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the ro...