Mostrando 2 resultados de: 2
How to obtaining keys in WLAN/WPS networks using wifislax and denial of services with kali linux
ArticleAbstract: The objective of this paper is to know what type of problem situations in terms of security can be fPalabras claves:attacks, ETHICAL HACKING, network, vulnerabilitiesAutores:Christian Muyón, Gabriela Vargas, Geovanni Ninahualpa Quiña, Teresa GuardaFuentes:scopusInformation security methods to protect rest web services communication and data in http requests using json web token and keycloak red hat single sign on
ArticleAbstract: Currently the protocols and open standards that are used to exchange data between applications or syPalabras claves:Auth, Jwt, Openid-connect, Postman, Security-domainAutores:Christian Muyón, Franklin MontaluisaFuentes:scopus