Advanced search
Showing result 21 - 25 of 313 essays matching the above criteria.
-
21. Automated Application Security Testing in Two Pharmacovigilance Systems
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : To improve the security of IT systems, companies can use automated security testing. In this thesis, three methods for automated security testingare evaluated and compared against each other. READ MORE
-
22. Empirical Comparison Between Conventional and AI-based Automated Unit Test Generation Tools in Java
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Unit testing plays a crucial role in ensuring the quality and reliability of software systems. However, manual testing can often be a slow and time-consuming process. With current advancements in artificial intelligence (AI), new tools have emerged for automated unit testing to address this issue. READ MORE
-
23. Digital security monitoring of cloud services - SLA Analyser- Availability Monitoring tool for DB Cloud Services
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Cloud computing is in current demand and widely used for businesses because of its scalability and flexibility. An agreement is signed between cloud providers and customers to guarantee the level of services are available as promised, it is called Service Level Agreement (SLA). READ MORE
-
24. Guidelines for white box penetration testing wired devices in secure network environments
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE
-
25. Static Analysis Of Client-Side JavaScript Code To Detect Server-Side Business Logic Vulnerabilities
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the real world, web applications are crucial in various domains, from e-commerce to finance and healthcare. However, these applications are not immune to vulnerabilities, particularly in business logic. Detecting such vulnerabilities can be challenging due to the complexity and diversity of application functionality. READ MORE