Zobrazeno 1 - 10
of 309
pro vyhledávání: '"Ethical hacking"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 3, Pp 410-448 (2024)
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by practitioners within the industry or underground communities. Similarly, academic researchers have also contributed to developing security tools. However, the
Externí odkaz:
https://doaj.org/article/f85a105f61314b72b081b1a9ece2f3d3
Comparative analysis of automated scanning and manual penetration testing for enhanced cybersecurity
Autor:
Rane, Nikhil, Qureshi, Amna
Yes
Web platform security has become a significant concern in the current cyber world. Adversaries constantly advance their skills and technologies to bypass modern cyber defence techniques to lure website vulnerabilities. In the cyber world, fi
Web platform security has become a significant concern in the current cyber world. Adversaries constantly advance their skills and technologies to bypass modern cyber defence techniques to lure website vulnerabilities. In the cyber world, fi
Externí odkaz:
http://hdl.handle.net/10454/19971
Autor:
Al-Tawil, Tareq Na’el
Publikováno v:
Journal of Money Laundering Control, 2023, Vol. 27, Issue 1, pp. 21-33.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JMLC-01-2023-0014
Autor:
Michael Dorin
Publikováno v:
South Sustainability, Vol 5, Iss 1 (2024)
Teaching ethical hacking requires access to a safe and controlled environment where students can practice skills presented to them. This can be a problem since many modern students attend class remotely, which makes lab access challenging. Virtualiza
Externí odkaz:
https://doaj.org/article/e56eb168abee44ffb3a0d71f6ee0f456
Publikováno v:
Internet of Things and Cyber-Physical Systems, Vol 3, Iss , Pp 280-308 (2023)
In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021; a number that could reach up to 75.44
Externí odkaz:
https://doaj.org/article/4ab3d558e12f401b907f4475b84f12c1
Publikováno v:
Redefining Community in Intercultural Context. 10(1):134-140
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1112709
Autor:
Hafiz Burhan Ul Haq, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar, Mahnoor Arshad
Publikováno v:
Pakistan Journal of Engineering & Technology, Vol 5, Iss 4 (2022)
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A perso
Externí odkaz:
https://doaj.org/article/46750802caa44842855565e827becdd8
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.