Treffer 1 - 17 von 17

2

Learning Python Web Penetration Testing
Martorella, Christian ; Martorella, Christian ; Martorella, Christian ; et al.

E-Ressource
Zu den Favoriten
3

An AI-Based Cyber Ranges to Strengthen the Cybersecurity of Cyber Physical Systems.
Sisodiya, Deepa Singh ; Tiwari, Ritu ; Jain, Priyank ; et al.
Journal of Applied Security Research; Oct-Dec2025, Vol. 20 Issue 4, p473-505, 33p

ARTIFICIAL intelligence CYBER physical systems COMPUTER security vulner... INTERNET security PENETRATION testing (Com... MACHINE learning
Fachzeitschrift
Zu den Favoriten
4

Practical Web Penetration Testing
Khawaja, Gus ; Khawaja, Gus ; Khawaja, Gus ; et al.

E-Ressource
Zu den Favoriten
5

Learning Penetration Testing with Python
Duffy, Christopher ; Duffy, Christopher ; Duffy, Christopher ; et al.

E-Ressource
Zu den Favoriten
7

Frameworks del lado del Servidor: Caso de Estudio Node JS, Django y Laravel
Esquivel Paula, Gladys ; Quisaguano Collaguazo, Luis ; Caluña Guaman, Abraham ; et al.
593 Digital Publisher CEIT, ISSN 2588-0705, Vol. 10, Nº. 1, 2025 (Ejemplar dedicado a: Multidisciplinary), pags. 403-414

E-Ressource
Zu den Favoriten
8

Izrada dodatka za alat BurpSuite za detekciju nesigurnih deserijalizacija objekata
Srdarev, Luka ; Groš, Stjepan

insecure deserialization penetration testing penetracijsko testiranje ranjivosti web aplikacij... cybersecurity kibernetička sigurnost
Dissertation
Zu den Favoriten
9

Python for Offensive PenTest
Khrais, Hussam ; Khrais, Hussam ; Khrais, Hussam ; et al.

E-Ressource
Zu den Favoriten
10

Hiding Vulnerabilities in a Sandbox Website for Cybersecurity Testing of Students
HESARIAN, MARYAM ; BADIA, LEONARDO

cybersecurity vulnerable web ethical hacking OWASP student evaluation
Zu den Favoriten
11

Cybersecurity Education: RunLabs Rapidly Create Virtualized Labs Based on a Simple Configuration File.
Justice, Connie ; Vyas, Rushabh
Proceedings of the ASEE Annual Conference & Exposition; 2017, p8376-8384, 9p

INTERNET security EDUCATION LABOR supply EXPERIENTIAL learning COMPUTER security
Konferenz
Zu den Favoriten
13

How to analyze visual data using zero-shot learning: An overview and tutorial.
Riordan, Benjamin ; Millward, Joshua ; He, Zhen ; et al.
Psychol Methods

Fachzeitschrift
Zu den Favoriten
14

Cybersecurity Education: RunLabs Rapidly Create Virtualized Labs Based on a Simple Configuration File
Connie Justice ; Rushabh Vyas
2017 ASEE Annual Conference & Exposition Proceedings.

4. Education 0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
15

Building a trustworthy distributed fuzzing framework
Chen, Hongyu ; Liu Yang ; Xu Yan ; et al.

Engineering::Electrical...
Zu den Favoriten
16

Investigating the influence of local and personal common ground on memory for conversation using an online referential communication task.
Nault, Daniel R. ; Voleti, Rohit ; Nicastro, Matthew ; et al.
Journal of Experimental Psychology

Fachzeitschrift
Zu den Favoriten
17

Policy capturing to support pilot decision-making: A proof of concept study.
Marois, Alexandre ; Lafond, Daniel ; Audouy, Amandine ; et al.
Aviation Psychology and Applied Human Factors, Vol 13(1), , 2023. pp. 26-38.

Fachzeitschrift
Zu den Favoriten

Filter