Academic literature on the topic 'Secure web-application development'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure web-application development.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure web-application development"
Arif Ulla, Sayyad. "Secure Development - Web Application Security." IOSR Journal of Computer Engineering 14, no. 6 (2013): 14–22. http://dx.doi.org/10.9790/0661-1461422.
Full textLee, Junho, Jungwoong Woo, Cheongan Lee, and Kyungsoo Joo. "A Software Development Methodology for Secure Web Application." International Journal on Advanced Science, Engineering and Information Technology 9, no. 1 (February 28, 2019): 336. http://dx.doi.org/10.18517/ijaseit.9.1.5987.
Full textMoon, Jae-Chan, and Seong-Je Cho. "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development." Journal of the Korea Society of Computer and Information 17, no. 2 (February 29, 2012): 127–37. http://dx.doi.org/10.9708/jksci.2012.17.2.127.
Full textKornienko, D. V., S. V. Mishina, and M. O. Melnikov. "The Single Page Application architecture when developing secure Web services." Journal of Physics: Conference Series 2091, no. 1 (November 1, 2021): 012065. http://dx.doi.org/10.1088/1742-6596/2091/1/012065.
Full textPathak, Nitish, B. M. Singh, and Girish Sharma. "UML 2.0 based framework for the development of secure web application." International Journal of Information Technology 9, no. 1 (February 22, 2017): 101–9. http://dx.doi.org/10.1007/s41870-017-0001-3.
Full textNathawat, Mukul Singh. "Development of Ecommerce Web Application: Pick & Buy." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 3683–85. http://dx.doi.org/10.22214/ijraset.2021.35628.
Full textMouratidis, Haralambos, and Miao Kang. "Secure by Design." International Journal of Secure Software Engineering 2, no. 3 (July 2011): 23–41. http://dx.doi.org/10.4018/jsse.2011070102.
Full textKorneva, L. A., and P. B. Khorev. "Development of framework secure application with client-server architecture." Informacionno-technologicheskij vestnik 15, no. 1 (March 30, 2018): 112–19. http://dx.doi.org/10.21499/2409-1650-2018-1-112-119.
Full textQu, Bo, and Zhong Xue Yang. "Design of Web Based Secure Embedded System in C." Applied Mechanics and Materials 347-350 (August 2013): 1635–40. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1635.
Full textXu, Hong Feng, and Gui Xian Zhou. "Study on the Trusted Operating Technology for Mobile E-Commerce System Secure." Applied Mechanics and Materials 519-520 (February 2014): 416–21. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.416.
Full textDissertations / Theses on the topic "Secure web-application development"
Chen, Tang-Li. "Designing secure, JAVA based online registration systems to meet peak load performance targets." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2767.
Full textСоколов, Руслан Миколайович. "Поліпшення захисту веб-застосунків впровадженням моделі білого списоку при розробці." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2019. https://ela.kpi.ua/handle/123456789/31341.
Full textThe work contains 46 pages, 9 figures, 9 tables, 13 references, 1 attachment. The aim of this qualification work is to design method concept for secure web application development based on whitelist model. The subject of the study is improving security and controlling web-application security implementation. Scientific novelty is the fact that for the first time whitelist model was used as methodic for secure web-application development. The results of the work are presented by secure development methodic which was successfully used and demonstrate security features of whitelist model implementation during development stage. The results of the work can be used as additional module during designing completed secure web apps development methodology for improving and controlling web-application security implementation.
Books on the topic "Secure web-application development"
Bhargav, Abhay. Secure Java: For web application development. Boca Raton, FL: CRC Press, 2011.
Find full textIBM WebSphere Application Server 8.0 administration guide: Learn to administer a reliable, secure, and scalable environment for running application with IBM WebSphere Application Server 8.0. Birmingham, U.K: Packt Publishing, 2011.
Find full textDeveloping Java Web services: Architecting and developing secure Web services using Java. Indianapolis, Ind: Wiley, 2003.
Find full textInc, ebrary, ed. WebSphere Application Server 7.0 administration guide: Manage and administer your Websphere Application Server to create a reliable, secure, and scalable environment for running your applications. Birmingham, UK: Packt Publishing, 2009.
Find full textMichel, Van Zoest, and ebrary Inc, eds. Oracle APEX 4.0 cookbook: Over 80 great recipes to develop and deploy fast, secure, and modern web applications with Oracle Application Express 4.0. Birmingham, U.K: Packt Enterprise, 2010.
Find full textInc, ebrary, ed. Oracle WebCenter 11g PS3 administration cookbook: Over 100 advanced recipes to secure, support, manage, and administer Oracle WebCenter. Birmingham [England]: Packt Pub. Ltd., 2011.
Find full textSecure Java: For Web Application Development. Taylor & Francis Group, 2017.
Find full textKabir, Mohammed J. Secure PHP Development: Building 50 Practical Applications. Wiley, 2003.
Find full textNagappan, Ramesh, Robert Skoczylas, and Rima Patel Sriganesh. Developing Java Web Services: Architecting and Developing Secure Web Services Using Java. Wiley, 2002.
Find full textSecure your Node.js web application: Keep attackers out and users happy. 2016.
Find full textBook chapters on the topic "Secure web-application development"
Susheel, S., N. V. Narendra Kumar, and R. K. Shyamasundar. "Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control." In Information Systems Security, 551–61. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_34.
Full text"Web Application Attack Surface." In Secure Development for Mobile Apps, 15–36. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17561-4.
Full text"Web Application Attack Surface." In Secure Development for Mobile Apps, 44–65. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17561-9.
Full textBalasubramanian, Kannan. "Developing Security Enabled Applications for Web Commerce." In Application Development and Design, 384–96. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3422-8.ch015.
Full textTappenden, A. F., T. Huynh, J. Miller, A. Geras, and M. Smith. "Agile Development of Secure Web-Based Applications." In Integrated Approaches in Information Technology and Web Engineering, 257–77. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-418-7.ch017.
Full textChung, Sam, Conrado Crompton, Yan Bai, Barbara Endicott-Popovsky, Seung-Ho Baeg, and Sangdeok Park. "Analyses of Evolving Legacy Software into Secure Service-Oriented Software using Scrum and a Visual Model." In Software Design and Development, 1764–86. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4301-7.ch084.
Full textAtzeni, Andrea, John Lyle, and Shamal Faily. "Developing Secure, Unified, Multi-Device, and Multi-Domain Platforms." In Application Development and Design, 539–64. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3422-8.ch023.
Full textDixit, Priyanka. "Security Issues in Web Services." In Handbook of Research on Network Forensics and Analysis Techniques, 57–64. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4100-4.ch004.
Full textKaur, Daljit, and Parminder Kaur. "Case Study." In Designing, Engineering, and Analyzing Reliable and Efficient Software, 239–50. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2958-5.ch014.
Full textYadav, Abhinav, Amrit Kanoi, and Ramani Selvanambi. "Blockchain Technology in E-Healthcare." In Blockchain Technologies for Sustainable Development in Smart Cities, 110–34. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9274-8.ch007.
Full textConference papers on the topic "Secure web-application development"
Subedi, B., Abeer Alsadoon, P. W. C. Prasad, and A. Elchouemi. "Secure paradigm for web application development." In 2016 15th RoEduNet Conference: Networking in Education and Research. IEEE, 2016. http://dx.doi.org/10.1109/roedunet.2016.7753243.
Full textLee, David, Brandon Steed, Yi Liu, and Onyeka Ezenwoye. "Tutorial: A Lightweight Web Application for Software Vulnerability Demonstration." In 2021 IEEE Secure Development Conference (SecDev). IEEE, 2021. http://dx.doi.org/10.1109/secdev51306.2021.00014.
Full textLapets, Andrei, Nikolaj Volgushev, Azer Bestavros, Frederick Jansen, and Mayank Varia. "Secure MPC for Analytics as a Web Application." In 2016 IEEE Cybersecurity Development (SecDev). IEEE, 2016. http://dx.doi.org/10.1109/secdev.2016.027.
Full textGlisson, William Bradley, L. Milton Glisson, and Ray Welland. "Secure Web Application Development and Global Regulation." In Second International Conference on Availability, Reliability and Security (ARES'07). IEEE, 2007. http://dx.doi.org/10.1109/ares.2007.133.
Full textNoor, Umara, and Zahid Rashid. "Secure Semantic Web Application Development: Present and Future." In 2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, 2016. http://dx.doi.org/10.1109/cse-euc-dcabes.2016.263.
Full textMaier, Patrik, Zhendong Ma, and Roderick Bloem. "Towards a Secure SCRUM Process for Agile Web Application Development." In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3103171.
Full textGupta, Shivangi, and Saru Dhir. "Issues, Challenges and Estimation Process for Secure Web Application Development." In 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, 2016. http://dx.doi.org/10.1109/cict.2016.51.
Full textJakeri, Mazni Mohamed, and Mohd Fadzil Hassan. "A Review of Factors Influencing the Implementation of Secure Framework for in-House Web Application Development in Malaysian Public Sector." In 2018 IEEE Conference on Application, Information and Network Security (AINS). IEEE, 2018. http://dx.doi.org/10.1109/ains.2018.8631401.
Full textCowan, Matthew, Joseph Lieberman, Jacob Cimbalista, and Bryan Schlake. "Electronic Freight Car Inspection Recording and Application of Internet-of-Things (IoT) and Machine-to-Machine (M2M) Frameworks." In 2018 Joint Rail Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/jrc2018-6192.
Full textMcIntosh, John, Renata Martin, Pedro Alcala, Stian Skjævesland, and John Rigg. "Implementation of a Digital Roadmap with Best-in-Class Applications." In SPE Offshore Europe Conference & Exhibition. SPE, 2021. http://dx.doi.org/10.2118/205418-ms.
Full text