Web application security in a crossing boundaries grid system
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
Why Johnny can't pentest: an analysis of black-box web vulnerability scanners
DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
Exploring the relationship betweenweb application development tools and security
WebApps'11 Proceedings of the 2nd USENIX conference on Web application development
Metamodeling to Control and Audit E-Commerce Web Applications
International Journal of Electronic Commerce
Hi-index | 0.00 |
Security testing a Web application or Web site requires careful thought and planning due to both tool and industry immaturity. Finding the right tools involves several steps, including analyzing the development environment and process, business needs, and the Web application's complexity.