Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
j
- JDBC Security Description: JDBC security involves securing Java Database Connectivity to protect interactions with databases. This is crucial in web(...) Read more
- Java Security Tokens Description: Java security tokens are fundamental elements in the authentication and authorization of users in Java applications. These tokens(...) Read more
- Java Security Context Description: The Java security context refers to the environment in which Java security policies are applied. This context is fundamental to(...) Read more
- Java Security Exception Description: A Java Security Exception is thrown when a security violation occurs in a Java application. This mechanism is part of Java's(...) Read more
- Java Security Frameworks Description: Java security frameworks provide tools and libraries to implement security features in Java applications. These frameworks are(...) Read more
- Java Security Libraries Description: Java security libraries are collections of code that provide security functions for Java applications. These libraries are designed(...) Read more
- Just-in-time (JIT) provisioning Description: Just-in-time provisioning (JIT) refers to the process of allocating computing resources only when they are needed, which is(...) Read more
- JSON Injection Description: JSON injection is a type of cyber attack that targets web applications that use JSON (JavaScript Object Notation) to exchange data.(...) Read more
- Java Deserialization Vulnerability Description: The Java deserialization vulnerability refers to a security risk that occurs when a Java application deserializes data that is(...) Read more
- JSP Vulnerability Description: JSP vulnerabilities (JavaServer Pages) are security flaws that can be exploited in web applications using this technology. JSP is a(...) Read more
- Java RMI Vulnerability Description: The Java RMI (Remote Method Invocation) vulnerability refers to a weakness in the remote method invocation system that allows an(...) Read more
- JWT Vulnerability Description: Vulnerabilities related to JSON Web Tokens (JWT) are a set of weaknesses that can arise due to improper validation of these tokens.(...) Read more
- Jitter Attack Description: Jitter attack is a network manipulation technique that focuses on altering the delivery timing of data packets. This type of attack(...) Read more
- JSP Cross-Site Scripting Description: Cross-Site Scripting (XSS) in JavaServer Pages (JSP) is a security vulnerability that allows an attacker to inject malicious(...) Read more
- Java Reflection Vulnerability Description: The reflection vulnerability in Java refers to a security risk that arises when Java's reflection API is misused. Reflection allows(...) Read more