Works matching DE "PENETRATION testing (Computer security)"


Results: 87
    1
    2
    3
    4

    Washington's Cyber Quandary.

    Published in:
    Journal: American Water Works Association, 2024, v. 116, n. 4, p. 5, doi. 10.1002/awwa.2259
    By:
    • Morley, Kevin M.
    Publication type:
    Article
    5
    6

    Vulnerability Scanning by CPE-CVE Matching.

    Published in:
    Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 1289
    By:
    • Adithya, Amaravadi;
    • Vyas, Vansh;
    • Mohan, Madan;
    • Aaswin, V. A.;
    • Lanka, Sanjana;
    • R., Ganeshan
    Publication type:
    Article
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38

    Freedom to Hack.

    Published in:
    Ohio State Law Journal, 2019, v. 80, n. 3, p. 455
    By:
    • KILOVATY, IDO
    Publication type:
    Article
    39
    40
    41

    Innovating Resilience.

    Published in:
    ISACA Journal, 2021, n. 3, p. 14
    By:
    • Kelley, K. Brian
    Publication type:
    Article
    42
    43
    44
    45

    Detection of Web Cross-Site Scripting (XSS) Attacks.

    Published in:
    Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142212
    By:
    • Alsaffar, Mohammad;
    • Aljaloud, Saud;
    • Mohammed, Badiea Abdulkarem;
    • Al-Mekhlafi, Zeyad Ghaleb;
    • Almurayziq, Tariq S.;
    • Alshammari, Gharbi;
    • Alshammari, Abdullah
    Publication type:
    Article
    46
    47
    48
    49
    50