Showing 1 - 17 of 17

2

Learning Python Web Penetration Testing
Martorella, Christian ; Martorella, Christian ; Martorella, Christian ; et al.

Electronic Resource
Save to List
3

An AI-Based Cyber Ranges to Strengthen the Cybersecurity of Cyber Physical Systems.
Sisodiya, Deepa Singh ; Tiwari, Ritu ; Jain, Priyank ; et al.
Journal of Applied Security Research; Oct-Dec2025, Vol. 20 Issue 4, p473-505, 33p

ARTIFICIAL intelligence CYBER physical systems COMPUTER security vulner... INTERNET security PENETRATION testing (Com... MACHINE learning
Academic journal
Save to List
4

Practical Web Penetration Testing
Khawaja, Gus ; Khawaja, Gus ; Khawaja, Gus ; et al.

Electronic Resource
Save to List
5

Learning Penetration Testing with Python
Duffy, Christopher ; Duffy, Christopher ; Duffy, Christopher ; et al.

Electronic Resource
Save to List
7

Frameworks del lado del Servidor: Caso de Estudio Node JS, Django y Laravel
Esquivel Paula, Gladys ; Quisaguano Collaguazo, Luis ; Caluña Guaman, Abraham ; et al.
593 Digital Publisher CEIT, ISSN 2588-0705, Vol. 10, Nº. 1, 2025 (Ejemplar dedicado a: Multidisciplinary), pags. 403-414

Electronic Resource
Save to List
8

Izrada dodatka za alat BurpSuite za detekciju nesigurnih deserijalizacija objekata
Srdarev, Luka ; Groš, Stjepan

insecure deserialization penetration testing penetracijsko testiranje ranjivosti web aplikacij... cybersecurity kibernetička sigurnost
Dissertation/ Thesis
Save to List
9

Python for Offensive PenTest
Khrais, Hussam ; Khrais, Hussam ; Khrais, Hussam ; et al.

Electronic Resource
Save to List
10

Hiding Vulnerabilities in a Sandbox Website for Cybersecurity Testing of Students
HESARIAN, MARYAM ; BADIA, LEONARDO

cybersecurity vulnerable web ethical hacking OWASP student evaluation
Save to List
11

Cybersecurity Education: RunLabs Rapidly Create Virtualized Labs Based on a Simple Configuration File.
Justice, Connie ; Vyas, Rushabh
Proceedings of the ASEE Annual Conference & Exposition; 2017, p8376-8384, 9p

INTERNET security EDUCATION LABOR supply EXPERIENTIAL learning COMPUTER security
Conference
Save to List
13

How to analyze visual data using zero-shot learning: An overview and tutorial.
Riordan, Benjamin ; Millward, Joshua ; He, Zhen ; et al.
Psychol Methods

Academic journal
Save to List
14

Cybersecurity Education: RunLabs Rapidly Create Virtualized Labs Based on a Simple Configuration File
Connie Justice ; Rushabh Vyas
2017 ASEE Annual Conference & Exposition Proceedings.

4. Education 0202 electrical engineer... 02 engineering and techn...
Academic journal
Save to List
15

Building a trustworthy distributed fuzzing framework
Chen, Hongyu ; Liu Yang ; Xu Yan ; et al.

Engineering::Electrical...
Save to List
16

Investigating the influence of local and personal common ground on memory for conversation using an online referential communication task.
Nault, Daniel R. ; Voleti, Rohit ; Nicastro, Matthew ; et al.
Journal of Experimental Psychology

Academic journal
Save to List
17

Policy capturing to support pilot decision-making: A proof of concept study.
Marois, Alexandre ; Lafond, Daniel ; Audouy, Amandine ; et al.
Aviation Psychology and Applied Human Factors, Vol 13(1), , 2023. pp. 26-38.

Academic journal
Save to List

Filter