Добірка наукової літератури з теми "Hyper-Text Transfer Protocol (HTTP)"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Hyper-Text Transfer Protocol (HTTP)".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Hyper-Text Transfer Protocol (HTTP)"

1

Munadi, Rizal, Mirza Purnandi, and Teuku Yuliar Arif. "Evaluasi Teknik Penyadapan Lalu Lintas Data Dengan Session Hijacking Pada Protokol HTTP." Informatika Mulawarman : Jurnal Ilmiah Ilmu Komputer 14, no. 2 (2019): 58. http://dx.doi.org/10.30872/jim.v14i2.1798.

Повний текст джерела
Анотація:
Hyper Text Transfer Protocol (HTTP) merupakan protokol jaringan aplikasi yang digunakan pada aplikasi berbasis web. Kerentanan protokol ini yang mengekspoitasi web server secara tidak aman, memberikan peluang peretas untuk melakukan serangan, salah satunya dengan serangan session hijacking. Oleh karena itu, dalam penelitian ini dilakukan survei kerentanan terhadap session hijacking dengan menguji beberapa web. Untuk mendapatkan data, maka digunakan Wi-fi UC browser untuk membaca lalulintas data protokol jaringan HTTP yang sedang dibuka oleh pengguna. Dalam pengujian diperoleh cookies yang digu
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Jeevankumari, Chevula, and Varanasi Aruna. "Enhancing Security of Data Exchange through Block Chain Technology." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 266–69. https://doi.org/10.35940/ijeat.D6826.049420.

Повний текст джерела
Анотація:
Cyber security refers to a set of well-defined techniques used to protect the integrity of networks. It is used to protect vital data of customers and to restrict unauthorised access. In the era of E-Commerce, the demand for websites, web application increasing exponentially day by day. Web security is currently a significant issue for Internet enabled organization. Using websites, managing information through digital way. HTTP is a Hyper Text Transfer Protocol. It is used to transfer information over the internet. HTTP is most popular protocol widely used in web applications and allowed by in
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Vraj, Pandya, and Andrei Stefan. "BRAIN Journal - About the Design of QUIC Firefox Transport Protocol." BRAIN: Broad Research in Artificial Intelligence and Neuroscience 8, no. 2 (2017): 26–32. https://doi.org/10.5281/zenodo.1045373.

Повний текст джерела
Анотація:
ABSTRACT QUIC (Quick UDP Internet Connections) Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP). To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hammoudi, Modhar A. "Building Model for the University of Mosul Computer Network Using OPNET Simulator." Tikrit Journal of Engineering Sciences 18, no. 2 (2011): 34–44. http://dx.doi.org/10.25130/tjes.18.2.04.

Повний текст джерела
Анотація:
This paper aims at establishing a model in OPNET (Optimized Network Engineering Tool) simulator for the University of Mosul computer network. The proposed network model was made up of two routers (Cisco 2600), core switch (Cisco6509), two servers, ip 32 cloud and 37 VLANs. These VLANs were connected to the core switch using fiber optic cables (1000BaseX). Three applications were added to test the network model. These applications were FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and VoIP (Voice over Internet Protocol). The results showed that the proposed model had a posit
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Almanza Olmedo, Moreno. "e-commerce cybersecurity vulnerability, http protocol case." Minerva 2, no. 6 (2021): 23–31. http://dx.doi.org/10.47460/minerva.v2i6.39.

Повний текст джерела
Анотація:
This paper was designed with the intention of analyzing the vulnerability of e-commerce web sites. We are going to describe the transmission of data in clear text without encryption by hypertext transfer protocol (HTTP), reason why we argue that by means of a sniffer technique this information can be captured and this way violating customer privacy information.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Widyantara, I. Made Oka, Muhammad Audy Bazly, and Ngurah Indra ER. "ADAPTIVE STREAMING OVER HTTP (DASH) UNTUK APLIKASI VIDEO STREAMING." Majalah Ilmiah Teknologi Elektro 14, no. 2 (2015): 18. http://dx.doi.org/10.24843/mite.2015.v14i02p04.

Повний текст джерела
Анотація:
This paper aims to analyze Internet-based streaming video service in the communication media with variable bit rates. The proposed scheme on Dynamic Adaptive Streaming over HTTP (DASH) using the internet network that adapts to the protocol Hyper Text Transfer Protocol (HTTP). DASH technology allows a video in the video segmentation into several packages that will distreamingkan. DASH initial stage is to compress the video source to lower the bit rate video codec uses H.26. Video compressed further in the segmentation using MP4Box generates streaming packets with the specified duration. These p
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Efendi, Yasin. "SISTEM INFORMASI FORUM KONSULTASI MAHASISWA PADA AMIK WAHANA MANDIRI TANGERANG BERBASIS WEB." Jurnal Ilmiah Sistem Informasi 2, no. 1 (2022): 69–77. http://dx.doi.org/10.46306/sm.v2i1.22.

Повний текст джерела
Анотація:
By this time computers were already an indispensable part of human life. The role of computers is felt in almost all areas of life, especially along with the rapid development of computer network technology, all the information we need can be obtained in just a short time. One of the protocols used for communication between one computer and another is HTTP (Hyper Text Transfer Protocol) which is a protocol used by all web-based systems. In this study, we will discuss the design of a web-based student consultation forum information system at AMIK Wahana Mandiri Tangerang Selatan. This system is
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bello, Rotimi-Williams. "Architectural Design of a Secured Web-Based Healthcare Portal." International Research Journal of Advanced Engineering and Science 3, no. 2 (2018): 332–40. https://doi.org/10.5281/zenodo.4451845.

Повний текст джерела
Анотація:
Abstract—Web-based healthcare portal refers to the health-related services that are accessed over a network connection using Hyper Text Transfer Protocol (HTTP), rather than existing within a device’s memory. However, Web-based healthcare portal also may be clientbased, where a small part of the health-related services are downloaded to a user’s desktop, but processing is done over the internet on an external server through which the portal is exposed to a lot of security pitfalls. Therefore, this research work intended to design defense architecture with security check point
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mustika, Fandi Ali, Febryo Ponco Sulistyo, and Chairul Anhar Tanof. "Implementasi System Captive Portal Dengan Otentikasi RADIUS." Jurnal Ilmiah FIFO 12, no. 1 (2020): 49. http://dx.doi.org/10.22441/fifo.2020.v12i1.005.

Повний текст джерела
Анотація:
Abstract The rapid development of Internet networks in offices, industries, homes, and universities, transforming the conventional system into modern, especially with the Internet. Therefore, it is very important to use a good authentication method to avoid unauthorized user access. Wireless network without authentication can harm users in their activities using Internet access. One of the most effective ways for secure wireless network authentication with Captive portals with Radius authentication method. Captive portals are web pages that control Hyper Text Transfer Protocol (HTTP) browser a
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Wasti, Abhijan, Saugat Tripathi, Sandeep Regmi, Sanjeev Yadav, and Dinesh Baniya Kshatri. "Aerial View Based Guidance System." Journal of Innovations in Engineering Education 3, no. 1 (2020): 1–13. http://dx.doi.org/10.3126/jiee.v3i1.34153.

Повний текст джерела
Анотація:
With the limited amount of resources and roads available, traffic congestion seems to be the current leading problem for urban areas. Reliance on the traditional vehicular navigation systems seems to a huge contributing factor, which simply cannot meet the present demand for better traffic management. While the existent navigation system relies on the Global Navigation Satellite System (GNSS) and predefined historic navigation data, a real time optimal pathfinding navigation system has been lacking. We have proposed a close to a real-time system that calculates an optimal path from start to de
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Hyper-Text Transfer Protocol (HTTP)"

1

Barford, Paul R. "Modeling, measurement and performance of World Wide Web transactions." Thesis, Boston University, 2001. https://hdl.handle.net/2144/36753.

Повний текст джерела
Анотація:
Thesis (Ph.D.)--Boston University<br>PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.<br>The size, diversity and continued growth of the World Wide Web combine to make its understanding difficult even at the most basic levels. The focus of our work is in developing novel methods for measuring and
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Walker, Briana Shanise. "Rethinking Document Classification: A Pilot for the Application of Text Mining Techniques To Enhance Standardized Assessment Protocols for Critical Care Medical Team Transfer of Care." Case Western Reserve University School of Graduate Studies / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=case1496760037827537.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tagmouti, Siham. "Architecture de communication générique pour un système de bus du commerce électronique." Thèse, 2003. http://hdl.handle.net/1866/14512.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Hyper-Text Transfer Protocol (HTTP)"

1

Kalyanaraman, S. Proving the Form and Function of Indus Script Hypertexts: Hyper Text Transfer Protocol of Ca. 3300 Bce Rebus Meluhha Spoken Metaphor Is the Cipher. Independently Published, 2018.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Hyper-Text Transfer Protocol (HTTP)"

1

Howser, Gerry. "Hyper Text Transfer Protocol: TheWeb." In Computer Networks and the Internet. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Maha Kavya Sri, J., V. G. Narendra, and Vidya Pai. "Implementing and Testing of Internet of Things (IoT) Technology in Agriculture and Compare the Application Layer Protocols: Message Queuing Telemetry Transport (MQTT) and Hyper Text Transport Protocol (HTTP)." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0111-1_29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Повний текст джерела
Анотація:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Hyper-Text Transfer Protocol (HTTP)"

1

"Hyper Text Transfer Protocol Compression." In International conference on Innovative Engineering Technologies. International Institute of Engineers, 2014. http://dx.doi.org/10.15242/e1214042.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!