Academic literature on the topic 'Web Applications; Storage; Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web Applications; Storage; Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Web Applications; Storage; Security"
Lyba, M. V., and L. Uhryn. "MODERN TOOLS FOR SECURITY TESTING FROM OWASP." Bulletin of Lviv State University of Life Safety 22 (December 28, 2020): 18–22. http://dx.doi.org/10.32447/20784643.22.2020.03.
Full textXie, Guo Bo, and Bing Ying Yao. "The Fingerprint Identification Technology is Applied to the Application Research of Web Cloud Storage Safety Certification." Applied Mechanics and Materials 536-537 (April 2014): 161–67. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.161.
Full textHuang, Lin Na. "Research and Application of Web Database Security Technology." Applied Mechanics and Materials 380-384 (August 2013): 2306–11. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2306.
Full textTofan, Dragoş Ovidiu. "Business Intelligence Security." Review of Economic and Business Studies 9, no. 1 (2016): 157–69. http://dx.doi.org/10.1515/rebs-2016-0030.
Full textSrinivasu, N., O. Sree Priyanka, M. Prudhvi, and G. Meghana. "Multilevel classification of security threats in cloud computing." International Journal of Engineering & Technology 7, no. 1.5 (2017): 253. http://dx.doi.org/10.14419/ijet.v7i1.5.9157.
Full textPatel, Iishi, Sambhav Jain, J. K. Vishwajeet, Vibhuti Aggarwal, and Pragati Mehra. "Securing Electronic Healthcare Records in Web Applications." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 236–42. http://dx.doi.org/10.35940/ijeat.e2781.0610521.
Full textVivek Tammineedi, Venkata Satya, and V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique." Journal of Computational and Theoretical Nanoscience 17, no. 5 (2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.
Full textShinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (2021): 189. http://dx.doi.org/10.3390/joitmc7030189.
Full textKellezi, Deina, Christian Boegelund, and Weizhi Meng. "Securing Open Banking with Model-View-Controller Architecture and OWASP." Wireless Communications and Mobile Computing 2021 (September 21, 2021): 1–13. http://dx.doi.org/10.1155/2021/8028073.
Full textAhirwar, Dr Anamika, Nikita Prajapat, and Simran Raj. "AN ANALYTICAL STUDY ON CLOUD COMPUTING." BSSS journal of computer 12, no. 1 (2021): 30–35. http://dx.doi.org/10.51767/jc1204.
Full textDissertations / Theses on the topic "Web Applications; Storage; Security"
Lin, Wenghui. "Data Security Enhancement for Web Applications Using Cryptographic Back-end Store." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/235.
Full textPrabhakara, Deepak. "Web Applications Security : A security model for client-side web applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8962.
Full textSvartberg, Anja. "Security in Offline Web Applications." Thesis, Norges Teknisk-Naturvitenskaplige Universitet, Institutt for elektronikk og telekommunikasjon, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10003.
Full textGe, Xiaocheng. "Agile security for Web applications." Thesis, University of York, 2007. http://etheses.whiterose.ac.uk/11071/.
Full textErdogan, Gencer. "Security Testing of Web Based Applications." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9993.
Full textSrilatha, Rondla, and Gande Someshwar. "Security Testing for Web Applications in SDLC." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2903.
Full textSingh, Kapil. "Designing security policies and frameworks for web applications." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41122.
Full textMundada, Yogesh. "Building data-centric security mechanisms for web applications." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/55013.
Full textUr-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.
Full textNgu, Phuc Huy. "Web applications - New mobile service paradigm." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19040.
Full textBooks on the topic "Web Applications; Storage; Security"
Lipyeow, Lim, Wang Wei, Li Chuan, Chen Lei, and SpringerLink (Online service), eds. Web-Age Information Management: 13th International Conference, WAIM 2012, Harbin, China, August 18-20, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textTesting Web security: Assessing the security of Web sites and applications. Wiley, 2002.
Find full textSplaine, Steve. Testing web security: Assessing the security of web sites and applications. Wiley, 2002.
Find full textThe tangled Web: A guide to securing modern Web applications. No Starch Press, 2011.
Find full textVincent, Liu, and Sima Caleb, eds. Hacking exposed: Web applications : web application security secrets and solutions. 3rd ed. McGraw-Hill, 2011.
Find full textWang, Jianyong. Web-Age Information Management: 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textBook chapters on the topic "Web Applications; Storage; Security"
Xu, Guosheng, Zhimin Wu, Chengze Li, et al. "Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching." In Security, Privacy, and Anonymity in Computation, Communication, and Storage. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24907-6_25.
Full textReagan, Rob. "Azure Table Storage." In Web Applications on Azure. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2976-7_5.
Full textReagan, Rob. "Azure Data Storage Overview." In Web Applications on Azure. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2976-7_3.
Full textWin, Khin-Myo, Wee-Keong Ng, and Ee-Peng Lim. "ENAXS: Efficient Native XML Storage System." In Web Technologies and Applications. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36901-5_6.
Full textWen, Mi, Shui Yu, Jinguo Li, Hongwei Li, and Kejie Lu. "Big Data Storage Security." In Big Data Concepts, Theories, and Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27763-9_6.
Full textCerullo, Fabio E. "Deploying Secure Web Applications with OWASP Resources." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_11.
Full textGong, Fengguang, Wenting Huang, Hao Luo, and Hailong Zhu. "DNFStore:A Distributed Netflow Storage System Supports Fast Retrieval." In Web Technologies and Applications. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11119-3_15.
Full textLee, Ho Jung, and Jung Hwan Song. "Designing Security Auditing Protocol with Web Browsers." In Information Security Applications. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11604938_29.
Full textHu, Xiangyu, Haiwei Zhang, and Xiaojie Yuan. "A Compact XML Storage Scheme Supporting Efficient Path Querying." In Web Technologies and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29253-8_68.
Full textChoi, Dae-Sik, Eul Gyu Im, and Cheol-Won Lee. "Intrusion-Tolerant System Design for Web Server Survivability." In Information Security Applications. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_10.
Full textConference papers on the topic "Web Applications; Storage; Security"
Hassan, Sabri, and Günther Pernul. "Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics." In iiWAS '14: The 16th International Conference on Information Integration and Web-based Applications & Services. ACM, 2014. http://dx.doi.org/10.1145/2684200.2684333.
Full textWang, Yazhe, Shunan Ma, and Lei Ren. "A Security Framework for Cloud Manufacturing." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4082.
Full textZheng, Zhihao, Yao Zhang, Vinay Gurram, Jose Salazar Useche, Isabella Roth, and Yi Hu. "Best Practices in Designing and Implementing Cloud Authentication Schemes." In 7th International Conference on Advances in Computer Science and Information Technology (ACSTY 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110307.
Full textJain, Vijay, and Amol Kolambkar. "Modeling Web Attachment Storage for Web Applications." In 2014 21st Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2014. http://dx.doi.org/10.1109/apsec.2014.24.
Full textTanaskovic, Tamara M., and Miodrag Z. Zivkovic. "Security principles for web applications." In 2011 19th Telecommunications Forum Telfor (TELFOR). IEEE, 2011. http://dx.doi.org/10.1109/telfor.2011.6143843.
Full textKushe, Renelada. "Security Assessment of Web Applications." In University for Business and Technology International Conference. University for Business and Technology, 2017. http://dx.doi.org/10.33107/ubt-ic.2017.189.
Full textLiu, Muyang, Ke Li, and Tao Chen. "Security testing of web applications." In GECCO '19: Genetic and Evolutionary Computation Conference. ACM, 2019. http://dx.doi.org/10.1145/3319619.3322026.
Full textMatsumoto, Shinichi, and Kouichi Sakurai. "Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image." In 2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS). IEEE, 2014. http://dx.doi.org/10.1109/asiajcis.2014.30.
Full textYadav, Divyani, Deeksha Gupta, Dhananjay Singh, Devendra Kumar, and Upasana Sharma. "Vulnerabilities and Security of Web Applications." In 2018 4th International Conference on Computing Communication and Automation (ICCCA). IEEE, 2018. http://dx.doi.org/10.1109/ccaa.2018.8777558.
Full textTeodoro, Nuno, and Carlos Serrao. "Assessing the Portuguese Web applications security." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749875.
Full textReports on the topic "Web Applications; Storage; Security"
The Path Toward a Hydrogen Economy: How Industry Can Broaden the Use of Hydrogen. King Abdullah Petroleum Studies and Research Center, 2020. http://dx.doi.org/10.30573/ks--2020-wb10.
Full text