تلقي هذه الدراسة الضوء على طرائق و أدوات اختبار تطبيقات الوب من الناحية الأمنية،
و تشرح تفاصيل استخدام هذه الأدوات، و ذلك بعد توضيح الثغرات الأمنية الأشهر التي
تعاني منها تطبيقات الوب، و تقدم في النهاية تقييماً لتلك الأدوات، و نقوم من خلال
الدراسة هذه أيضاً بمحاولة مساعدة المطورين على اختيار الأداة الأنسب لاحتياجاتهم.
This study will put spot light on web applications testing methods
and tools from the security aspects, and we will explain the details
about using these tools, after we have explained the most famous
weak points and vulnerabilities that web applications suffer from.
At the end we will evaluate these tools.
By this study we try to help developers to choose the most
suitable method and tool for their needs.
References used
BAU.J, BURSZTEIN.E, GUPTA.D, MITCHELL.J,2009-State of The Art: Automated Black Box Web Application Vulnerability Testing, Stanford Computer Security Lab
SHARABANI.A, DR.HAVIV.Y,2008-Web Application Scanners Black Box vs. White Box, IBM Rational Application Security
(NIDHRA.S, DONDETI.J, 2012-black box and white box testing techniques: a literature review, International Journal of Embedded Systems and Applications (IJESA
Web Engineering Methodologies (WebML UWE Hera RMM) support the representation and
modeling of web services in a lifecycle, based on service oriented architecture (SOA). Theses
methodologies, however, vary in supporting semantic web components and s
We present in this paper a study aimed to identify actual situation of
information systems security management in The Ministry of
Communications and Technology and entities associated, and the
ways to improve it.
This paper presents tools and data sources collected and released by the EMBEDDIA project, supported by the European Union's Horizon 2020 research and innovation program. The collected resources were offered to participants of a hackathon organized a
We introduce a taxonomic study of parallel programming models
on High-Performance architectures. We review the parallel
architectures(shared and distributed memory), and then the
development of the architectures through the emergence of the
heter
With the increasing growth in popularity of Web services and SOA, discovering
relevant Web services becomes a significant challenge. The introduction of intentional
services is necessary to bridge the gap between low level, technical software-servi