The focus of this study is to find out repeatable features for large-scale enterprise web application production process related to based on OWASP security requirement list. As a result of a rigorous work including domain analysis for Java language and development frameworks and the examination of a large set of technical documents, 230 security qualitative metrics are discovered, under six categories. These security qualitative metrics are beneficial for security analysts as well as other parties such as designers, developers, and testers. The fmdings provide a developer/designer point of view and would help to make better decisions related to the environment set up, technology selection, and the architecture, design, and implementation de...
Protection of data, information, and knowledge is a hot topic in today’s business environment. Socie...
Applications Security Testing tools are one of the resources most widely used by developers to guara...
The attack surface of a system represents the exposure of application objects to attackers and is af...
The attack surface of a system is the amount of application area that is exposed to the adversaries...
Developing a secure Web application is very difficult task. Therefore developers need a guideline to...
the internet and the World Wide Web are the most amazing and dynamicall ygrowing computer technologi...
Nowadays web application becomes an important part of every one’s life to pay bills online, to buy t...
The purpose of this thesis was to evaluate the security of the commissioners web application by cond...
Masters Degree. University of KwaZulu-Natal, Durban.Web applications are instrumental for businesse...
The impact of the World Wide Web on basic operational economical components in global information-ri...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
Defects in requirement specifications can have severe consequences during the software development l...
This new digitalized era is bringing lots of advantages in the world of business today as many proce...
The use of web applications has drastically increased over the years, and so has the need to secure ...
Web-Commerce applications are now an indispensable aspect of businesses around the world. More busin...
Protection of data, information, and knowledge is a hot topic in today’s business environment. Socie...
Applications Security Testing tools are one of the resources most widely used by developers to guara...
The attack surface of a system represents the exposure of application objects to attackers and is af...
The attack surface of a system is the amount of application area that is exposed to the adversaries...
Developing a secure Web application is very difficult task. Therefore developers need a guideline to...
the internet and the World Wide Web are the most amazing and dynamicall ygrowing computer technologi...
Nowadays web application becomes an important part of every one’s life to pay bills online, to buy t...
The purpose of this thesis was to evaluate the security of the commissioners web application by cond...
Masters Degree. University of KwaZulu-Natal, Durban.Web applications are instrumental for businesse...
The impact of the World Wide Web on basic operational economical components in global information-ri...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
Defects in requirement specifications can have severe consequences during the software development l...
This new digitalized era is bringing lots of advantages in the world of business today as many proce...
The use of web applications has drastically increased over the years, and so has the need to secure ...
Web-Commerce applications are now an indispensable aspect of businesses around the world. More busin...
Protection of data, information, and knowledge is a hot topic in today’s business environment. Socie...
Applications Security Testing tools are one of the resources most widely used by developers to guara...
The attack surface of a system represents the exposure of application objects to attackers and is af...