Verification of Web Applications vulnerabilities / Mahmoud Salah Mohamed Mubarak ; Supervised Akram Salah , Fatma A. El-Licy
Material type: TextLanguage: English Publication details: Cairo : Mahmoud Salah Mohamed Mubarak , 2014Description: 116 Leaves : charts ; 30cmOther title:- تحقيق نقاط الضعف في تطبيقات الويب [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Thesis | قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2014.Ma.V (Browse shelf(Opens below)) | Not for loan | 01010110065340000 | |||
CD - Rom | مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2014.Ma.V (Browse shelf(Opens below)) | 65340.CD | Not for loan | 01020110065340000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.18.02.M.Sc.2014.Ja.E Enhancing security in E-government based on public-key infrastructure / | Cai01.18.02.M.Sc.2014.Ja.E Enhancing security in E-government based on public-key infrastructure / | Cai01.18.02.M.Sc.2014.Ma.V Verification of Web Applications vulnerabilities / | Cai01.18.02.M.Sc.2014.Ma.V Verification of Web Applications vulnerabilities / | Cai01.18.02.M.Sc.2014.Me.S A secured server - side web - based geographic information system / | Cai01.18.02.M.Sc.2014.Me.S A secured server - side web - based geographic information system / | Cai01.18.02.M.Sc.2014.Ze.P A Proposed approach for fuzzy ontology-based information retrieval / |
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Sciences
Web security issues play an important role in the development of real life web systems. Malicious attacks of the web based systems, usually, inflect damages and losses in finance capitals and may, even, compromise the reputation of those institutes under attack. Web security issues include Buffer overflow, Cookie poisoning, SQL injection, Cross Site Scripting, Bypass Restrictions on Input Choices, CGI Parameters and Hidden field manipulation. Those vulnerabilities can be discovered by applying software testing techniques. The discovery of vulnerability in given software, would, normally, assist in rectifying the software as well as adjusting the design and implementation for better practice to avoid such vulnerability. Generally, white box testing techniques are adopted to expose these types of vulnerabilities. Software testing techniques are adopted, not only, to guarantee certain level of fault coverage, but also, to ensure security of the programs
Issued also as CD
There are no comments on this title.