Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research. For research purposes Wordpress and Joomla websites were created and investigated for security by vulnerability scanners OWASP ZAP, Vega, Detectify and Skipfish. Results were grouped by some criteria: vulnerabilities by category and vulnerabilities by threat level. Obtained results were examined in two ways: analysis of residual results, for each website scanning and analysis of aggregated results from all scanners. After that, conclusions about CMS platforms security have been drawn
Cloud computing, like most modern IT solutions, can provide many benefits for or­ganizations, bu...
The article presents a comparison of CMS systems that can be used when creating an intranet platform...
The article attempts to determine the impact of the risks associated with DDoS on business. It puts ...
Subject of security the most popular CMS platforms has been undertaken in the following thesis. Ther...
Application security is one of the key aspects necessary for its proper functioning. Ensuring securi...
This article is about web application security. Describes the most common types of web attacks. The ...
The article discusses the issue of the security of Internet applications. The most popular types of ...
To achieve a satisfactory level of security of an information system, different system and applicati...
. This article presents the methods of enhancing the performance and security of web applications. I...
In this paper the authors present the characteristics of cloud computing in the context of the possi...
The subject of this article is to compare iOS mobile operation system encryption algorithms performa...
Głównym celem pracy jest przybliżenie zjawiska cyberprzestępczości, podkreślenie jej specyfiki na tl...
The topics covered in this article are the risks that must be taken into account when developing the...
Modem security systems in information society, both national and international, require the consider...
This article provides information about contemporary threats to information security in cyberspace. ...
Cloud computing, like most modern IT solutions, can provide many benefits for or­ganizations, bu...
The article presents a comparison of CMS systems that can be used when creating an intranet platform...
The article attempts to determine the impact of the risks associated with DDoS on business. It puts ...
Subject of security the most popular CMS platforms has been undertaken in the following thesis. Ther...
Application security is one of the key aspects necessary for its proper functioning. Ensuring securi...
This article is about web application security. Describes the most common types of web attacks. The ...
The article discusses the issue of the security of Internet applications. The most popular types of ...
To achieve a satisfactory level of security of an information system, different system and applicati...
. This article presents the methods of enhancing the performance and security of web applications. I...
In this paper the authors present the characteristics of cloud computing in the context of the possi...
The subject of this article is to compare iOS mobile operation system encryption algorithms performa...
Głównym celem pracy jest przybliżenie zjawiska cyberprzestępczości, podkreślenie jej specyfiki na tl...
The topics covered in this article are the risks that must be taken into account when developing the...
Modem security systems in information society, both national and international, require the consider...
This article provides information about contemporary threats to information security in cyberspace. ...
Cloud computing, like most modern IT solutions, can provide many benefits for or­ganizations, bu...
The article presents a comparison of CMS systems that can be used when creating an intranet platform...
The article attempts to determine the impact of the risks associated with DDoS on business. It puts ...