Please use this identifier to cite or link to this item: http://192.168.9.248:8080/jspui/handle/123456789/809
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHusain, Mohd Shahid ed.-
dc.contributor.authorFaisal, Mohammad ed.-
dc.contributor.authorSadia, Halima ed.-
dc.contributor.authorAhmad, Tasneem ed.-
dc.contributor.authorShukla, Saurabh ed.-
dc.date.accessioned2024-01-18T04:47:20Z-
dc.date.available2024-01-18T04:47:20Z-
dc.date.issued2023-
dc.identifier.uri10.4018/978-1-6684-8133-2.ch002-
dc.identifier.urihttp://192.168.9.248:8080/jspui/handle/123456789/809-
dc.descriptionCHAPTER 2 : The Critical Analysis of E-Commerce Web Application Vulnerabilities by Gausiya Yasmeen, Syed Adnan Afaqen_US
dc.description.abstractLarge-scale deployments of web applications occur continuously. The failure to validate or sanitize form inputs, improperly configured web servers, and application design flaws are the main causes of security vulnerabilities that continue to infect web applications, allowing hackers to access sensitive data and using legitimate websites as a breeding ground for malware. These vulnerabilities can be used to compromise the security of the application. The largest problem that enterprises face is how to create a web application that satisfies their needs for safe processes, E-Commerce, and the transmission of sensitive data. OWASP updates and releases a list of the top 10 web application vulnerabilities every few years. Along with the OWASP Top 10 Threats, this chapter also discusses each vulnerability's possible effects and how to avoid them. According to the OWSP (Open Online Application Security Project) Top Ten, this document analyses the most serious web vulnerabilities, their causes, and their impacts.en_US
dc.language.isoenen_US
dc.publisherIGI Globalen_US
dc.subjectComputer Applicationen_US
dc.subjectCyber Securityen_US
dc.titleAdvances in Cyberology and the Advent of the Next-Gen Information Revolutionen_US
dc.typeBook chapteren_US
Appears in Collections:Books/Book Chapters/Edited Books

Files in This Item:
File Description SizeFormat 
BOOK CHPATER 2 2023-2024 CA.pdfIGI350 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.