FOYDALANILGAN ADABIYOTLAR:
1.
O’zbekiston Respublikasi Prezidentining Farmoni, 2022 — 2026-yillarga
mo’ljallangan yangi O’zbekistonning taraqqiyot strategiyasi to’g’risida. 2022-yil.
2.
Core_Security.
(2018).
What
is
Penetration
Testing
Available:
https://www.coresecurity.com/content/penetration-testing
3.
T.Laskos. (2017). Arachni Apllication Security Scanner Framework.
4.
INFOSEC_Institute. (2016).
The
History
of
Penetration
Testing.
5.
OWASP. (2016). Fuzzing. Available: https://www.owasp.org/index.php/Fuzzing
6.
Z. T. Watson_ C., "Automated-threat-handbook," 2016.
7.
A. C. Barus, D. I. P. Hutasoit, J. H. Siringoringo, and Y. A. Siahaan, "White
box testing tool prototype development," in 2015 International Conference on Electrical
Engineering and Informatics (ICEEI), 2015, pp. 417-422.
8.
S. Xu, L. Chen, C. Wang, va O. Rud, "A comparative study on black-box
testing with open source applications," 2016 IEEE/ACIS International Conference on
PEDAGOG RESPUBLIKA ILMIY JURNALI
6 –TOM 2 – SON / 2023 - YIL / 15 - FEVRAL
www.bestpublication.org
501
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed
Computing (SNPD), 2016, pp. 527-532.
9.
Information Security Stack Exchange. (2017). Effectiveness of Interactive
Application Security Testing.
10.
P. E. Black, "Static Analyzers in Software Engineering.pdf," National Institute
of Standards and Technology2009.
11.
Skoussa. (2018, January). What do SAST, DAST, IAST and RASP mean to
developers.
12.
Y. Wang and J. Yang, "Ethical hacking and network defense: Choose your best
network vulnerability scanning tool," in Proceedings - 31st IEEE International
Conference on Advanced Information Networking and Applications Workshops,
WAINA 2017, 2017, pp. 110-113.
13.
OWASP. (2017).
OWASP
Top
Ten
Project.
Available:
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_
Top_1 0_for_2017_Release_Candidate_1
14.
OWASP. (2016). Cross Site Scripting. London
15.
PortSwigger_Ltd. (2018,
2018).
SQL
injection.
16.
R. K., "A benchmark approach to analyse the security of web frameworks,"
Master, Computer Science, Radboud University Nijmegen, Nijmegen, Netherlands,
2014.
17.
Infosec_Institute. (2018).
File-Inclusion Attack.
18.
M. El, E. McMahon, S. Samtani, M. Patton, and H. Chen, "Benchmarking
vulnerability scanners: An experiment on SCADA devices and scientific instruments," in
2017 IEEE International Conference on Intelligence and Security Informatics (ISI),
2017, pp. 83-88.
19.
PENTESTGEEK.
(2018).
WHAT
IS
BURP
SUITE.
Link:
https://www.pentestgeek.com/what- is-burpsuite
|