ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Technology
Education
Computing
Communication
Research
Architecture and Urbanism
Social Sciences
Pure sciences
Literature
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
Austria
Ukraine
Canada
Spain
Turkey, Turkish Republic
Germany
Romania
all records (72)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
85.477  Articles
1 of 8.549 pages  |  10  records  |  more records»
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya untuk mengakses berita maupun informasi. Salah satu media yang sering digunak... see more

Web Application Security is considered crucial in the era of rapid technology development, following with recent rapid development of artificial intelligence architecture, virtual reality and the internet of things, one of important node which is a web ap... see more

The use of a web application firewall is a necessity to protect web-based applications from attacks. The application of a web application firewall on web-based applications can reduce attacks that occur. From the security aspect, it is necessary to know h... see more

The use of server computer machines in companies is primarily a web hosting server that is very easy to experience threats, especially external security threats such as attempts to infiltrate, hacking, viruses, and other malicious attacks. Having a secure... see more

SQL Injection Attacks are a common threat for web-based applications that use insecure input validation to target database attacks. This becomes a very serious problem in web-based applications because successful execution causes loss of integrity and con... see more

Increasing the security of web applications on the integrated campus management information system needs to be done because the application is accessed by public networks so that there are many attacks and attempts to prevent threats from attackers. This ... see more

Illegal links appear more often through social networks with "dizzying" speed. When users click on a "malicious" link it can bring them potential danger. One of the most popular social networks is Facebook. It is one of the ways for hackers to share malic... see more

With the increasing trends of web-based attacks and successful hacks through vulnerability in web application, many organizations has turned to Web Application Firewall (WAF) as a countermeasure to secure their website from intruders. Despite its effectiv... see more

1 of 8.549 pages  |  10  records  |  more records»