Security in the internet environment and concrete examples of attacking
This article describes how to implement the attack, as well as the ability to implement an application's defense against an attacker. The implementations that are most commonly used today as methods of attack on Web applications are presented. The main goal was to investigate the possibilities...
Main Authors: | Saračević Muzafer H., Rešović Nermin |
---|---|
Format: | Article |
Language: | Bosnian |
Published: |
Univerzitet u Novom Pazaru
2017-01-01
|
Series: | Univerzitetska Misao |
Subjects: | |
Online Access: | https://scindeks-clanci.ceon.rs/data/pdf/1451-3870/2017/1451-38701716147S.pdf |
Similar Items
-
Assessment of the web application security effectiveness against various methods of network attacks
by: Mateusz Erbel, et al.
Published: (2018-12-01) -
Detection of Web Cross-Site Scripting (XSS) Attacks
by: Mohammad Alsaffar, et al.
Published: (2022-07-01) -
Cloud Based Secure Web Application
by: Saad K. Majeed, et al.
Published: (2015-10-01) -
Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro
by: Hilal Afrih Juhad, et al.
Published: (2016-08-01) -
Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks
by: Babu R. Dawadi, et al.
Published: (2023-02-01)