Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilities of digital directories in public Universities. Argues the relevance of information in contemporary societies like an invaluable resource, emphasizing scientific information as an essential element to constitute scientific progress. Characterizes the emergence of Digital Repositories and highlights its use in academic environment to preserve, promote, disseminate and encourage the scientific production. Describes the main software for the construction of digital repositories. Method. The investigation identified and analyzed the vulnerabilities that are exposed the digital repositories using Penetration Testing running. Discriminating the ...
The paper is aimed at researching the dynamic of objects publications in question of threats activit...
In the recent years Information Technology has been under various different threats most of the thre...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
The aim of this paper is to introduce the problem concerning the threat to the data for the purposes...
Abstract. Security has become the Achilles ’ heel of most modern soft-ware systems. Techniques rangi...
The consequences of a class of system failures, commonly known as software vulnerabilities, violate ...
We propose to leverage public vulnerability scanners to examine the servers where online digital pro...
The rapid growth of computer technologies has resulted in a corresponding increase in the creation o...
Today, digital development is happening at such a high rate that security is not as prioritized as i...
The sharing economics of digital resources such as application programming interface and software de...
Open-source code hosted online at programming portals is present in 99% of commercial software and i...
Software vulnerabilities are defects or weaknesses in a software system that if exploited can lead t...
The threat of attack by computer viruses is in reality a very small part of a much more general thre...
As computer networks evolve, so too does the techniques used by attackers to exploit new vulnerabili...
The paper is aimed at researching the dynamic of objects publications in question of threats activit...
In the recent years Information Technology has been under various different threats most of the thre...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
The aim of this paper is to introduce the problem concerning the threat to the data for the purposes...
Abstract. Security has become the Achilles ’ heel of most modern soft-ware systems. Techniques rangi...
The consequences of a class of system failures, commonly known as software vulnerabilities, violate ...
We propose to leverage public vulnerability scanners to examine the servers where online digital pro...
The rapid growth of computer technologies has resulted in a corresponding increase in the creation o...
Today, digital development is happening at such a high rate that security is not as prioritized as i...
The sharing economics of digital resources such as application programming interface and software de...
Open-source code hosted online at programming portals is present in 99% of commercial software and i...
Software vulnerabilities are defects or weaknesses in a software system that if exploited can lead t...
The threat of attack by computer viruses is in reality a very small part of a much more general thre...
As computer networks evolve, so too does the techniques used by attackers to exploit new vulnerabili...
The paper is aimed at researching the dynamic of objects publications in question of threats activit...
In the recent years Information Technology has been under various different threats most of the thre...
Most computerized information systems we use in our everyday lives provide very little protection ag...