ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Computing
Economy
Technology
Computing
Research
Architecture and Urbanism
Biology
Social Sciences
Administration - Business
all records (73)

Languages
English
Spanish
German
Portuguese

Countries
Indonesia
USA
Ukraine
Brazil
South Africa
Canada
Russia
Germany
Italy
Austria
all records (73)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
21.090  Articles
1 of 2.109 pages  |  10  records  |  more records»
The development of information technology cannot be separated from the development of website applications, as well as the threat of security attacks that will attack website applications. Educational Institution X uses a website application as an importa... see more

Wireless Network is a collection of electronic devices that connect to each other using air devices or frequencies as a data traffic flow. Today, there are many users who use WPA2-PSK or WPA2-EAP as a wireless network security system that aims to prevent ... see more

The growth of device user is always increasing and the costs are not expensive. Users already have several sophisticated end user networking tools for daily use, including laptops, smartphones and tablets. For internet access users use LAN and WLAN networ... see more

Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, ... see more

The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted... see more

Payment transactions developed along with technological developments, now days technology supports digital payment, each type of digital transaction has its own security services,  this study focus on the analysis of security services (confidentialit... see more

In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal ha... see more

The rapid development of technology is aligned with the development of web-based applications and it also increases security attacks and various threat techniques that attack the web. The integrated service office at the XYZ local government has used the ... see more

SISAKTI application is an information system to facilitate online administration of Udayana University student participation credit units. Until now, there has been no security testing carried out on the SISAKTI application, therefore this study aimed to ... see more

1 of 2.109 pages  |  10  records  |  more records»