Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Web Application Security: A Pragmatic Exposé
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LSgMxFA0-Nm58g_VFFm5jZ5I7SUZKYRhaRBB8leKqZJKMXVgttYK_5Hf4YyaTmVrBhevkDnlMOOcm996D0BkFDVxLQ0AYQaCUmkgqLFGOyYFNS0WZTxQeyqtHensn-3ldJsfnwphn951J9YTvz7QqauERSNrMQTdLYRWtO9c78ocwy68X9ymOp4CstNEoTymJHVEPObLLth6C9GQJgpawpL-FBs0oqkDq8xBIEq4UfkVYN6Ua_zfgbbRZk0uchb9hB63Ylz0EnXF3aAuc_TxV4_tata7THncvcIZvZuqpqt2Kex_T17evz3006Pce8ktSayUQt5rpnBiImHaujHN_tGQWbExtrKQoSmN0BCphwnJWaFYKq41SwhrglhvNZZkaZ3KAcJQom9KEQulZlKMmDs5lnCjGhYpFBC2066Y6moYyGKN6ei2Em9VcNIVs56Tpcvin4RHaoI4h-LgrGh2jtfns3Z4ETYbTam-_AbNinqw
Digital Threats (Print), Volume 5, Issue 2, pp. 1 - 9
Journal Article : Full Text Online
-
Security For Three-Tiered Web Application Security For Three-Tiered Web (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Pa8IwFH7ITrsMxwbObZLDrsE2SZMIIjhZ0d2mBfFU0jSl8-CGbP-_eU1l3oZs15BffCF87_F-fABPTFghrS6pUKWiotKWaqYcNd6SE25UGcaxUHitXzfsbanT2YnUF-aEhfbAAbih899AKqUSJCKrZVFag6RTRJZbHUr3vFd-4kxtQ_iMy0Y2LZYooxahFPuxKT9r2SPtwlVr9pFpOO4aOm53A_W4nqxa_bjxsJ6Q9GNPMg-uo9k7amgSP2HtCjL9iTKTcxfgvFtYpC_ZbE7xavlnaDCRY8vnZsADkbdA5L8BwXtAosS4EUuYqNAO8saFJ2QdJ4ZLZWIViTt4_vtB_f_Y5B4uGRJkk831ABdf-2_3GAQZBs1THgB0-qZJ
Ibn Al Haitham Journal For Pure And Applied Sciences, Volume 28, Issue 2.
Journal Article : Full Text Online
-
Application of Deep Learning Algorithm for Web Shell Detection in Web (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3LSgMxFA3iyo0oCtYXWbiddppk8oBSqNUi7rRKcTVk8miL9oHWfr83mVTryo3bvBhuQs65TO45CF0RZhg30mZMWJExL00miXCZBibHnPKa0FAoPJL3L-ThUQ76W1Zf4U1YLQ9cB66VE68qRynxJLgjc-W9rgDFGAC9acfiaQJZ-VYyBSeJMcGUTBWb4U4mKjhqqeg0B_lzEOmq6-gowDdvfUyBIr4uZs11m05pEyCT_cKpjZw_TbgzOED7iTDiXv2hh2jHzY_QujPp9n5-PXdaky5eeHzj3BInxdQx7r2NF5D6T2YYiCmGGSNXxZHD8PgTBq_iM6w5ns5TL95aEw-Ts109JQo-H6Pnwe1T_y5LDgqZCVdhVoiqKAqhgcY4pSphreTaKWqAtVjtuKXWQFMQAZMV5MKacU6INZIXRulc0xOE8wJmkIIwH7gVEBYAedkuNOVCt0XOGijbBKpc1goZJWQWMbDlJrBlDGwZAttA1yGa32ODvnVsgF0v066Xf-366X8scob2CFCUUFlI8nO0u3r_dBe1KcRlPE5fdgHJSA
Jurnal Sisfokom, Volume 13, Issue 3, pp. 330 - 336
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
Web application security : Iberic web application security conference, IBWAS 2009, Madrid, (...)
https://find.library.duke.edu/catalog/DUKE99119540576508501
Book : View Online
-
Grokking web application security.
https://find.library.duke.edu/catalog/DUKE99119532536308501
Video : View Online
-
Grokking Web Application Security.
https://find.library.duke.edu/catalog/DUKE99119248400108501
Book : View Online
Our WebsiteSee all website results »
Guides, policies, news more
-
Duke University Libraries Privacy Statement | Duke University Libraries
https://library.duke.edu/about/privacy
We use your personal information for the purpose for which you submitted it, and we occasionally invite you to provide optional feedback on your (...)
-
Facilities Coordinator | Duke University Libraries
https://library.duke.edu/about/jobs/facilitiescoordinator
In addition, they provide back-up support in the security services and materials distribution activities that support the operational (...)
-
Duke University Records Retention Guidelines - Student Affairs
https://library.duke.edu/sites/default/files/rubenstein/archives-other/StudentAffairs-Final.pdf
Primary Heading: School of Medicine—Records which support advising and counseling of medical students, as well as evaluative activities and (...)
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info