Academic literature on the topic 'Security of web applications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security of web applications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security of web applications"
Wu, Raymond, and Masayuki Hisada. "SOA Web Security and Applications." Journal of Object Technology 9, no. 2 (2010): 163. http://dx.doi.org/10.5381/jot.2010.9.2.a4.
Full textErşahin, Buket, and Mustafa Erşahin. "Web application security." South Florida Journal of Development 3, no. 4 (2022): 4194–203. http://dx.doi.org/10.46932/sfjdv3n4-002.
Full textJalgasbaevna, PerdebaevaInabat. "Identifying andMitigating Security Vulnerabilities inWeb Applications." American Journal of Applied Science and Technology 5, no. 5 (2025): 10–11. https://doi.org/10.37547/ajast/volume05issue05-03.
Full textPankaj, Choudhary, Aaseri Rajendra, and Roberts Nirmal. "HTTPI BASED WEB SERVICE SECURITY OVER SOAP." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (2013): 55–66. https://doi.org/10.5281/zenodo.4278394.
Full textSidoon, Diaddeen, Anwar Alhenshiri, and Inass Husien. ", WASec, a Web security scanner for Web Application." مجلة العلوم الاساسية و التطبيقية, no. 10 (June 23, 2025): 48–56. https://doi.org/10.36602/jsba.2020.10.48.
Full textShah, Sarthak. "Fortifying Data Security." International Journal of Applied and Advanced Multidisciplinary Research 1, no. 3 (2023): 221–28. http://dx.doi.org/10.59890/ijaamr.v1i3.679.
Full textAlrawais, Layla Mohammed, Mamdouh Alenezi, and Mohammad Akour. "Security Testing Framework for Web Applications." International Journal of Software Innovation 6, no. 3 (2018): 93–117. http://dx.doi.org/10.4018/ijsi.2018070107.
Full textAlzahrani, Abdulrahman, Ali Alqazzaz, Nabil Almashfi, Huirong Fu, and Ye Zhu. "Web Application Security Tools Analysis." Studies in Media and Communication 5, no. 2 (2017): 118. http://dx.doi.org/10.11114/smc.v5i2.2663.
Full textMorgan, David. "Network security and custom Web applications." Network Security 2004, no. 4 (2004): 15–17. http://dx.doi.org/10.1016/s1353-4858(04)00068-6.
Full textJoshi, James B. D., Walid G. Aref, Arif Ghafoor, and Eugene H. Spafford. "Security models for web-based applications." Communications of the ACM 44, no. 2 (2001): 38–44. http://dx.doi.org/10.1145/359205.359224.
Full textDissertations / Theses on the topic "Security of web applications"
Prabhakara, Deepak. "Web Applications Security : A security model for client-side web applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8962.
Full textSvartberg, Anja. "Security in Offline Web Applications." Thesis, Norges Teknisk-Naturvitenskaplige Universitet, Institutt for elektronikk og telekommunikasjon, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10003.
Full textGe, Xiaocheng. "Agile security for Web applications." Thesis, University of York, 2007. http://etheses.whiterose.ac.uk/11071/.
Full textUr-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.
Full textErdogan, Gencer. "Security Testing of Web Based Applications." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9993.
Full textCharpentier, Rojas Jose Enrique. "Web application Security." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.
Full textSrilatha, Rondla, and Gande Someshwar. "Security Testing for Web Applications in SDLC." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2903.
Full textAvancini, Andrea. "Security Testing of Web and Smartphone Applications." Doctoral thesis, Università degli studi di Trento, 2013. https://hdl.handle.net/11572/368950.
Full textAvancini, Andrea. "Security Testing of Web and Smartphone Applications." Doctoral thesis, University of Trento, 2013. http://eprints-phd.biblio.unitn.it/1123/1/andrea-avancini-phd-thesis-last.pdf.
Full textFoss, Julie-Marie, and Nina Ingvaldsen. "Web Application Security." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9235.
Full textBooks on the topic "Security of web applications"
Vincent, Liu, and Sima Caleb, eds. Hacking exposed: Web applications : web application security secrets and solutions. 3rd ed. McGraw-Hill, 2011.
Find full textSplaine, Steve. Testing web security: Assessing the security of web sites and applications. Wiley, 2002.
Find full textSerrão, Carlos, Vicente Aguilera Díaz, and Fabio Cerullo, eds. Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9.
Full textInc, ebrary, ed. GlassFish security: Secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures. Packt Open Source, 2010.
Find full text1980-, Clark Chris, and Thiel David V, eds. Mobile application security: Protect mobile applications and devices from Web 2.0 attacks. McGraw-Hill, 2010.
Find full textBook chapters on the topic "Security of web applications"
Cerullo, Fabio E. "Deploying Secure Web Applications with OWASP Resources." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_11.
Full textTeodoro, Nuno, and Carlos Serrão. "Web Applications Security Assessment in the Portuguese World Wide Web Panorama." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_17.
Full textSiles, Raul. "Assessing and Exploiting Web Applications with the Open-Source Samurai Web Testing Framework." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_7.
Full textFernández-Sanguino, Javier. "Protection of Applications at the Enterprise in the Real World: From Audits to Controls." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_13.
Full textSahu, Satej Kumar. "Web Security for PHP Applications." In Building Secure PHP Applications. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0932-3_3.
Full textBasin, David, Patrick Schaller, and Michael Schläpfer. "Web Application Security." In Applied Information Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_6.
Full textHarris, Steve, and Rob Macdonald. "Web Application Security." In Moving to ASP.NET: Web Development with VB .NET. Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-1097-9_11.
Full textLee, Ho Jung, and Jung Hwan Song. "Designing Security Auditing Protocol with Web Browsers." In Information Security Applications. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11604938_29.
Full textVaradharajan, Vijay. "Security and Trust in the Web." In Web Technologies and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29253-8_2.
Full textChoi, Dae-Sik, Eul Gyu Im, and Cheol-Won Lee. "Intrusion-Tolerant System Design for Web Server Survivability." In Information Security Applications. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_10.
Full textConference papers on the topic "Security of web applications"
Diyora, Vishal, and Nilesh Savani. "Blockchain or AI: Web Applications Security Mitigations." In 2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT). IEEE, 2024. http://dx.doi.org/10.1109/ic2sdt62152.2024.10696861.
Full textDafalla, Yousif, Dalton A. Brucker-Hahn, Drew Davidson, and Alexandru G. Bardas. "Web-Armour: Mitigating Reconnaissance and Vulnerability Scanning with Scan-Impeding Delays in Web Deployments." In 2024 Annual Computer Security Applications Conference (ACSAC). IEEE, 2024. https://doi.org/10.1109/acsac63791.2024.00028.
Full textMycek, Andrzej, and Maryna Lukaczyk. "Multi-Layered Security Of Web Applications In Cloud Environments Using WAF, Zero Trust, AI-Driven Threat Detection, And RASP." In 39th ECMS International Conference on Modelling and Simulation. ECMS, 2025. https://doi.org/10.7148/2025-0262.
Full textTeodoro, Nuno, and Carlos Serrao. "Web application security: Improving critical web-based applications quality through in-depth security analysis." In 2011 International Conference on Information Society (i-Society). IEEE, 2011. http://dx.doi.org/10.1109/i-society18435.2011.5978496.
Full textKushe, Renelada. "Security Assessment of Web Applications." In University for Business and Technology International Conference. University for Business and Technology, 2017. http://dx.doi.org/10.33107/ubt-ic.2017.189.
Full textLiu, Muyang, Ke Li, and Tao Chen. "Security testing of web applications." In GECCO '19: Genetic and Evolutionary Computation Conference. ACM, 2019. http://dx.doi.org/10.1145/3319619.3322026.
Full textTanaskovic, Tamara M., and Miodrag Z. Zivkovic. "Security principles for web applications." In 2011 19th Telecommunications Forum Telfor (TELFOR). IEEE, 2011. http://dx.doi.org/10.1109/telfor.2011.6143843.
Full textWinslett, Marinne. "Session details: Web applications security." In CCS07: 14th ACM Conference on Computer and Communications Security 2007. ACM, 2007. http://dx.doi.org/10.1145/3245855.
Full textOh, ChangSeok, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, and Wenke Lee. "DeView: Confining Progressive Web Applications by Debloating Web APIs." In ACSAC: Annual Computer Security Applications Conference. ACM, 2022. http://dx.doi.org/10.1145/3564625.3567987.
Full textTeodoro, Nuno, and Carlos Serrao. "Assessing the Portuguese Web applications security." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749875.
Full textReports on the topic "Security of web applications"
Agarwal, Smisha, Madhu Jalan, Holly C. Wilcox, et al. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), 2022. http://dx.doi.org/10.23970/ahrqepctb41.
Full textBossert, G., S. Cooper, and W. Drummond. Considerations for Web Transaction Security. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2084.
Full textAldrich, Susan. Web Services Security Issues and Antidotes. Patricia Seybold Group, 2003. http://dx.doi.org/10.1571/ii2-27-03cc.
Full textScholl, Lynn, Daniel Oviedo, and Orlando Sabogal-Cardona. Disrupting Personal (In)Security? The Role of Ride-Hailing Service Features, Commute Strategies, and Gender in Mexico City. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003812.
Full textVenkatram, Nischay. Benchmarking AssemblyScript for Faster Web Applications. Iowa State University, 2020. http://dx.doi.org/10.31274/cc-20240624-288.
Full textde Jesus, Ana, and Sara Melander. From Vision to Practice – Insights from Nordic-Baltic 5G applications across sectors. Nordregio, 2024. http://dx.doi.org/10.6027/r2024:111403-2503.
Full textNguyen-Tuong, Anh, Salvatore Guarnieri, Doug Greene, and David Evans. Automatically Hardening Web Applications Using Precise Tainting. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada436667.
Full textBaratloo, A., M. Karaul, H. Karl, and Z. M. Kedem. KnittingFactory: An Infrastructure for Distributed Web Applications. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada439808.
Full textGruninger, Michael. Applications of PSL to semantic web services. National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7165.
Full textPritychenko, B., and A. A. Sonzogni. SIGMA WEB INTERFACE FOR REACTOR DATA APPLICATIONS. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/970612.
Full text