z-logo
open-access-imgOpen Access
Bounty techniques for web vulnerability scanning
Author(s) -
Tanzer Abazi,
Mentor Hoxhaj,
Edmond Hajrizi,
Gazmend Krasniqi
Publication year - 2015
Language(s) - Uncategorized
Resource type - Conference proceedings
DOI - 10.33107/ubt-ic.2015.101
Subject(s) - hacker , web application security , computer security , vulnerability (computing) , raising (metalworking) , computer science , internet privacy , world wide web , data security , the internet , web development , engineering , encryption , mechanical engineering

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here