{"id":2600,"date":"2023-08-16T09:25:51","date_gmt":"2023-08-16T09:25:51","guid":{"rendered":"http:\/\/goagiletechnologies.com\/?page_id=2600"},"modified":"2024-09-18T21:27:35","modified_gmt":"2024-09-18T21:27:35","slug":"applications-security","status":"publish","type":"page","link":"https:\/\/goagiletechnologies.com\/ar\/applications-security\/","title":{"rendered":"\u0623\u0645\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"tm-row wpb_row vc_row-fluid vc_custom_1726694770086 vc_row-has-fill tm-zindex-0 tm-bgimage-position-center_center tm-bg tm-bgimage-yes\">\n\n\t\t\t<div class=\"tm-row-wrapper-bg-layer tm-bg-layer\"><\/div><!-- ThemetechMount custom DIV added -->\n\t\t\n\t <div class=\"vc_row container\"> \t\n\t\t\n\n<div class=\"wpb_column tm-column vc_column_container vc_col-sm-6 tm-zindex-0\">\n\t<div class=\"vc_column-inner\">\n\t\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h1 style=\"text-align:left;font-size:60px;line-height:1.1;\" class=\"tm-custom-heading\" >\u0623\u0645\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a<\/h1>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\n\n<div class=\"wpb_column tm-column vc_column_container vc_col-sm-6 tm-zindex-0\">\n\t<div class=\"vc_column-inner\">\n\t\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\t\t\n\t <\/div> <\/div>\n\n\n<div class=\"vc_row-full-width vc_clearfix\"><\/div>\n\n\n\n\n\n\n\n\n<div class=\"tm-row wpb_row vc_row-fluid vc_custom_1726694783010 tm-zindex-0 vc_row container tm-bgimage-position-center_center\">\n\n\t\t\n\t\t\n\t\t\n\n<div class=\"wpb_column tm-column vc_column_container vc_col-sm-12 tm-zindex-0\">\n\t<div class=\"vc_column-inner\">\n\t\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Application security includes the security of sites and web applications. The standards of use security is applied basically to the Internet and Web frameworks. Web Application Defense is intensely centered on weakness the board from a web security angle.<br \/>\nGoagile offers the types of assistance of use security with a famous infiltration testing device used to recognize weaknesses on the organization. TeleNoc security experts and infiltration analyzers will find weaknesses inside web applications. We give the most ideal ways of keeping them from dangers.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\t\t\n\t<\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"Application Security Application security includes the security of sites and web applications. The standards of use security is applied basically to the Internet and Web frameworks. Web Application Defense is intensely centered on weakness the board from a web security angle. Goagile offers the types of assistance of use security with a famous infiltration testing &hellip; <a href=\"https:\/\/goagiletechnologies.com\/ar\/applications-security\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">\u0623\u0645\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a<\/span><\/a>","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-2600","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages\/2600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/comments?post=2600"}],"version-history":[{"count":6,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages\/2600\/revisions"}],"predecessor-version":[{"id":4162,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages\/2600\/revisions\/4162"}],"wp:attachment":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/media?parent=2600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}