![](images/graphics/blank.gif)
Finding vulnerabilities
-
This book covers code examples written in C# with steps on remediating various ASP.NET Core web application vulnerabilities discovered by a secure code review or security test. You'll find practical examples and different ways to solve the security bugs introduced by insecure code in a recipe-style format.
324p
duyhai707
15-07-2024
2
2
Download
-
Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 2 includes contents: Chapter 10: exploiting path traversal, chapter 11: attacking application logic, chapter 12: attacking other users, chapter 13: automating bespoke attacks, chapter 14: exploiting information disclosure, chapter 15: attacking compiled applications, chapter 16: attacking application architecture, chapter 17: attacking the web server, chapter 18: finding vulnerabilities in source code, chapter 19: a web application hacker’s toolkit, chapter 20: a web application hacker’s methodolog...
404p
haojiubujain010
14-12-2023
6
3
Download
-
Lecture "Penetration testing: Finding vulnerabilities" provide students with knowledge about: Nmap scripting engine; Web application scanning; Metasploit; Manual analysis. Please refer to the detailed content of the lecture!
21p
hoabingan205
12-12-2022
10
5
Download
-
Climate change caused by environmental pollution is the most important one of many environmental health hazards currently faced by human beings. In particular, the extreme temperature is an important risk factor for death from respiratory and circulatory diseases. This study aims to explore the meteorological-health effect and find out the vulnerable individuals of extreme temperature events in a less developed city in western China.
12p
viferrari
28-11-2022
9
2
Download
-
The Indian population is rapidly aging with huge proportion of illiterate and socioeconomically disadvantaged people and there is a dearth of research on the relationships between factors of socioeconomic vulnerability and frailty in older people. The present study examined the cross-sectional associations between socioeconomic vulnerability and physical frailty in community-dwelling older individuals in India.
11p
vinobelprisen
26-03-2022
12
5
Download
-
The results indicate that the highest level of double energy vulnerability is among households that face a combination of multiple socio-demographic disadvantages alongside relative spatial peripheralisation. We signal future research directions and policy implications arising from these findings.
16p
huangminghao_1902
27-02-2022
17
2
Download
-
The find a dominance of quantitative approaches that tend to use existing (and often limited) forms of survey data, and a relative absence of detailed qualitative research. As such, we argue there is an urgent need for transformative research and policy activities within Latin America and the Caribbean, in order to support access to clean, reliable, and affordable energy services for all.
13p
huangminghao_1902
27-02-2022
17
2
Download
-
This finding suggests that over-promotion of export-oriented agriculture could leave smallholder farmers and disadvantaged populations in a vulnerable situation. Their food security could be enhanced by the conservation of community-based natural resources with respect given to the role of TEK.
6p
guernsey
28-12-2021
10
0
Download
-
These research findings emphasized the need for improving the understanding of climate change that could impact farmers’ livelihoods, farmers’ access to accurate near-time and medium-term weather forecasts, and thoroughly using local knowledge on climate risks and effective native adaptation measures for better adaptation and mitigation strategies and actions in rural climate-vulnerable communities in Vietnam.
12p
chauchaungayxua12
09-07-2021
8
1
Download
-
Despite long-term or permanent health problems, cancer survivors are often motivated to return to work. For cancer survivors who have lost their job, return to work can be more challenging compared to employed survivors, as they generally find themselves in a more vulnerable social and financial position.
11p
vialabama2711
21-09-2020
14
1
Download
-
Ebook Kali Linux web penetration testing cookbook present the content: setting up Kali Linux; reconnaissance; crawlers and spiders; finding vulnerabilities; automated scanners; exploitation – low hanging fruits; advanced exploitation; man in the middle attacks; client-side attacks and social engineering; mitigation of owasp top 10...
297p
tuando2403
02-08-2020
40
11
Download
-
Climate change impacts on agriculture are being witnessed all over the world, but countries like India are more vulnerable in view of the huge population dependent on agriculture, excessive pressure on natural resources and poor coping mechanisms. NICRA is an ICAR initiative launched to focus on educating and demonstrating the climate resilient agriculture technologies to the farmers. The study was conducted in Ananthapuram district of Andhra Pradesh to find out the knowledge of farmers towards climate resilient technologies.
9p
angicungduoc6
22-07-2020
15
1
Download
-
In recent decades, unsustainable use of resources and the implementation of dams upstream accompanied with sea level rise acceleration has led to an extreme mangrove depletion, increase of coastal vulnerability in the Mekong delta. Extensive shrimp culture, where mangrove forest have been turned into aquaculture ponds are adding to the problem. The aim was to assess the current situation and find solutions which go in hand with the Building with Nature (BwN) concept for two selected locations along the Vinh Chau coast.
9p
caygaolon
31-10-2019
32
2
Download
-
Reactive Powder Concrete (RPC) is a type of ultra-high strength concrete. Due to its dense microstructure, is vulnerable to explosive spalling at elevated temperatures. Remarkable application of RPC in special structures throughout the world has drawn the attention to understand the performance of RPC at elevated temperatures, which has not been investigated extensively yet. The main objective of this work was to evaluate the performance of RPC at elevated temperatures from 200 C to 800 C, by obtaining residual mechanical properties after exposure.
14p
christian2605
10-10-2019
17
0
Download
-
In order to find out which level ofthe seismic design can be used in defining the fragility curves, different weights were considered to apply to the HAZUS fragility curves of high, moderate, low and pre-code to be used in the logic tree method. Finally, the mean and standard deviation values were introduced for the construction of fragility curves with the lognormal distribution for the seven Iranian building types.
15p
meriday
20-04-2019
23
1
Download
-
(bq) this book, give you an overview of hacking and penetration testing, show you how it’s done, and then i’m going to tell you how to keep your systems secure so that you can’t be hacked!
63p
physicalfunny
29-08-2018
48
5
Download
-
The data have been structured by an advanced text analytic method, Pertex (by generation of intentionality of verbal actors from text). Findings – The authors can conclude that the experience of lack of competency in internet banking implies a severe damage on the experience of the ethics of the good life and of the respect for the basic ethical principles of customer autonomy, dignity, integrity and vulnerability.
17p
kimcang111
31-03-2014
58
2
Download
-
Of the current attacks on Web applications, those based on script injection are by far the most prominent. For ex- ample, script injection is used in cross-site scripting [1] and Web application worms [2, 24]. A script injection vulnerability may be present when- ever a Web application includes data of uncertain origin in its Web pages; a third-party comment on a blog page is an example of such untrusted data.
11p
giamdocamnhac
06-04-2013
53
6
Download
-
This report details the findings of a colloquium held in November 2003 which presented HIV/AIDS policy research conducted by the HSRC in projects across Botswana, Lesotho, Mozambique, South Africa, Swaziland and Zimbabwe. The colloquium also focused on the status of orphaned and vulnerable children in Botswana, South Africa and Zimbabwe.
0p
chieckhanpieu
19-03-2013
49
1
Download
-
Vulnerability assessment methodologies for information systems have been weakest in their ability to guide the evaluator through a determination of the critical vulnerabilities and to identify appropriate security mitigation techniques to consider for these vulnerabilities. The Vulnerability Assessment and Mitigation (VAM) methodology attempts to fill this gap, building on and expanding the earlier RAND methodology used to secure a system’s minimum essential information infrastructure (MEII).
0p
trinhosieupham
06-02-2013
58
4
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)