Security of sites and web apps

Abstract

The article describes the most common types of attacks and various vulnerabilities with which hackers manage to penetrate and hack a software product. The relevance of this topic is due to the fact that, despite the high progress in the field of system security, many systems, including websites, can still be hacked by intruders.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,907

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

  • Only published works are available at libraries.

Similar books and articles

Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
Medical Apps: Public and Academic Perspectives.William H. Krieger - 2013 - Perspectives in Biology and Medicine 56 (2):259-273.
Vulnerabilities and responsibilities: dealing with monsters in computer security.W. Pieters & L. Consoli - 2009 - Journal of Information, Communication and Ethics in Society 7 (4):243-257.
The Fascist Moment: Security, Exclusion, Extermination.Mark Neocleous - 2009 - Studies in Social Justice 3 (1):23-37.

Analytics

Added to PP
2022-09-01

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references