Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
PHP is one of the most commonly used languages to develop web sites because of its simplicity, easy to learn and it can be easily embedded with any of the databases. A web developer with his basic knowledge developing an application... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyWeb ApplicationsWorld Wide Web
While the 21st century has seen the explosion of the Internet bubble and the arrival of Web 2.0, the standards have changed very little to support the growing number of new programs. Nevertheless developers have managed to continue... more
    • by 
    •   2  
      detect store XSS attacksCross Site Scripting
The Presentation contains slides about web server security and was used for the presentation for Network Security class in IIIT-B.
    • by 
    •   22  
      Information SystemsInformation TechnologyInformation SecurityNetwork Security
zz
    • by 
    • detect store XSS attacks
Masyarakat jenis ini menjalankan hidup secara otonom dan terlibat dalam interaksi saling mengenal satu sama lain. Mereka menerima keragaman dan pada waktu yang sama berusaha mempertahankan budaya mereka. Contoh: suku yang menerima... more
    • by 
    • detect store XSS attacks
Popularity of the web increases nowadays and it is used every day and it needs a high security. Web vulnerability scanner (WVS) is a tools that can make observation of a web that can help developers or pentester web to find... more
    • by  and +1
    •   2  
      Sql Injectiondetect store XSS attacks
In this paper we proposed a framework model instrument to assess web application security components. The philosophy depends on the possibility that infusing practical vulnerabilities in a web application and assaulting them naturally can... more
    • by 
    •   2  
      Sql Injectiondetect store XSS attacks
Cross Site Scripting(XSS) is the most popular security problem in modern web application. In Cross Site Scripting, attacker uses a trusted site and injects a vulnerability script in the client or server side browser. This code when... more
    • by 
    •   2  
      detect store XSS attacksXss
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and... more
    • by 
    •   58  
      Cognitive PsychologyCognitive ScienceComputer ScienceProgramming Languages
high
    • by 
    •   2  
      Non-Governmental Organizations (NGOs)detect store XSS attacks
PHP is one of the most commonly used languages to develop web sites because of its simplicity, easy to learn and it can be easily embedded with any of the databases. A web developer with his basic knowledge developing an application... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyWeb ApplicationsWeb 2.0 applications
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have... more
    • by 
    •   14  
      Digital WatermarkingWavelet TransformsVideo WatermarkingMedical Image Watermarking