Results for: java netbeans object-oriented forms

Suggested Categories:

Forms Automation Software
Forms automation software is a type of software used to streamline various organizational processes. It can help automate the creation and distribution of forms, as well as the collection and analysis of data from those forms. It typically includes features such as search capabilities, integration with other systems, automated notifications, and customizable templates. These tools can help organizations save time and money by reducing manual tasks associated with form processing.
Online Form Builders
Online form builders enable the creation of fillable forms through a drag-and-drop interface in order to be embedded or shared on web pages.
Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
Form Analytics Software
Form analytics tools allow website owners to track, monitor, manage and analyze visitor interactions with web forms.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Patient Intake Software
Patient intake software streamlines the process of collecting and managing patient information before or during their visit to a healthcare facility. It automates the registration process by enabling patients to submit personal details, medical history, insurance information, and consent forms digitally. This reduces paperwork, minimizes errors, and speeds up check-in times for a smoother patient experience. The software often integrates with electronic health records (EHR) and practice management systems to ensure seamless data flow and improved accuracy. By optimizing intake workflows, it helps healthcare providers focus more on patient care and less on administrative tasks.
Waiver Software
Waiver software helps businesses and organizations create, manage, and store electronic waivers and consent forms for customers or participants. These platforms typically include tools for customizing waiver templates, capturing digital signatures, and storing waivers securely in compliance with legal and regulatory requirements. Waiver software often integrates with mobile devices and websites, allowing customers to sign forms online or on-site using tablets or smartphones. By using this software, businesses can streamline the waiver process, reduce paper handling, and improve the efficiency of collecting necessary legal documentation.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
Business Filing Services
Business filing services enable anyone to quickly and easily create a business. Business filing services streamline the process of business registration, obtaining business licenses, and creating business entities such as an LLC, corporation, limited company, S corp, and more. Business filing services may also offer a la carte legal services.
HIPAA Compliance Software
HIPAA compliance software is designed to help organizations in the healthcare industry meet the requirements of the Health Insurance Portability and Accountability Act (HIPAA). These platforms provide tools to ensure that sensitive patient information is protected and that healthcare providers are compliant with HIPAA's privacy and security regulations. Features typically include secure data storage, encryption, access controls, audit trails, and risk assessments, helping organizations identify potential vulnerabilities and mitigate risks. HIPAA compliance software also helps with employee training, policy management, and reporting to ensure that organizations remain compliant during audits. By using this software, healthcare providers can reduce the risk of data breaches, avoid legal penalties, and ensure patient privacy.
NoSQL Database
NoSQL database software provides the tools to store, capture and retrieve of big data through the use of non tabular databases.
Health Assessment and Screening Software
Health screening and assessment software is a valuable tool for companies of any size. It can help organizations measure employee health risk factors and overall wellness. This type of software collects data on health conditions, lifestyle habits, and body measurements to assess an individual's health status. The data collected by the software can be used to develop tailored health plans that could reduce medical costs while improving overall wellbeing. Additionally, this type of software also assists in the tracking of progress towards meeting organizational goals for a healthier workplace environment.
View more categories (16) for "java netbeans object-oriented forms"

67 Products for "java netbeans object-oriented forms" with 2 filters applied:

  • 1
    Source Defense

    Source Defense

    Source Defense

    ...-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience. The Source Defense Platform protects against all forms of client-side security incidents – keylogging, formjacking, digital skimming, Magecart, etc. – by extending web security beyond the server to the client-side (the browser).
    Partner badge
    View Software
    Visit Website
  • 2
    Javascript Obfuscator

    Javascript Obfuscator

    Javascript Obfuscator

    JavaScript Obfuscator transforms readable JavaScript source code into an obfuscated and unintelligible form, preventing reverse engineering, tampering, and intellectual property theft while preserving full functionality and compatibility with the latest ECMAScript versions. It includes powerful features such as minification and compression for reduced file size and faster load times, dead code insertion to confuse static analysis, and domain- or IP-based locking to disable code execution...
    Starting Price: Free
  • 3
    Jscrambler

    Jscrambler

    Jscrambler

    Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic JavaScript obfuscation with fine-grained third-party tag protection in a unified Client-Side Protection and Compliance Platform. Our integrated solution ensures a robust defense against current and emerging client-side cyber threats, data leaks, and IP theft, empowering software development and digital teams to innovate securely. With Jscrambler, businesses adopt a unified, future...
    View Software
    Visit Website
  • 4
    jsObf

    jsObf

    jsObf

    jsObf is a powerful, web-based JavaScript encryption and obfuscation tool that enables users to transform readable JavaScript code into obfuscated, secure versions via direct input or file uploads (up to 5 MB). It also serves developers through its API, offering two endpoints, one for raw code and another for file uploads, with configurable output formats (JSON or XML) and adjustable complexity levels. It simplifies protection workflows with intuitive, drag-and-drop interfaces and backend API...
    Starting Price: $49.99 per month
  • 5
    SparkView

    SparkView

    beyond SSL

    ... and servers - Access from any device with browser (e.g. Chrome, Firefox, Edge, Opera, Safari, etc.) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
    Starting Price: $60 per year
  • 6
    Auth.js

    Auth.js

    Auth.js

    Auth.js is an open-source authentication library designed to integrate seamlessly with modern JavaScript frameworks, providing a flexible and secure authentication experience. It supports various authentication methods, including OAuth (e.g., Google, GitHub), credentials, and WebAuthn, allowing developers to choose the most suitable approach for their applications. Auth.js is compatible with multiple frameworks, such as Next.js, SvelteKit, Express, Qwik, and SolidStart, enabling developers...
    Starting Price: Free
  • 7
    urlscan.io

    urlscan.io

    urlscan.io

    urlscan.io is a free service to scan and analyze websites. When a URL is submitted to urlscan.io, an automated process will browse to the URL like a regular user and record the activity that this page navigation creates. This includes the domains and IPs contacted, the resources (JavaScript, CSS, etc.) requested from those domains, as well as additional information about the page itself. urlscan.io will take a screenshot of the page, and record the DOM content, JavaScript global variables...
    Starting Price: $500 per month
  • 8
    Imperva Client-Side Protection
    Client-Side Protection provides real-time monitoring of all client-side resources and JavaScript behavior. Gain control over all first and third-party JavaScript code embedded on your website. Actionable insights make it easy to identify risky resources and scripts that should not load on your client side. And if any JavaScript code is compromised, your security team is the first to know. Provides comprehensive inventorying, authorization, dynamic integrity verification, and real...
  • 9
    AgeChecker.Net

    AgeChecker.Net

    AgeChecker.Net

    ... are verified directly on your website during checkout. We are a real age verification solution, not just a pop-up! We match customer information from your checkout form against our identity networks to verify that a customer meets your minimum age requirements. All major e-commerce platforms are supported. When a customer is ready to place their order, the AgeChecker.Net popup will appear and explain the verification process and why it is required.
    Starting Price: $25 per month
  • 10
    Criminal IP

    Criminal IP

    AI SPERA

    ...-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth. With Criminal IP’s 4 main features (Asset Search, Domain Search, Exploit Search, and Image Search), you can find IP risk scores and related vulnerabilities of searched IP addresses and domains, details on the exploit codes for each service, and assets that are left wide open to cyber threats in the form of images respectively.
    Leader badge
    Starting Price: $0/month
    View Software
    Visit Website
  • 11
    Appenate

    Appenate

    Appenate

    Reduce Paper-Based Work With Our Drag-n-Drop App Builder. Create Data-Driven Apps That Empower Your Business. Mobile & Desktop. No Coding Required. A no-code platform for creating data-driven apps to replace paper forms across all industries. Use our versatile drag-n-drop software to schedule, dispatch, track & manage jobs. “Appenate allowed our company to go paperless in the field & gave us the ability to move towards other paperless operations. Within a month we had a department of 12...
    Starting Price: $11.90/month/user
  • 12
    Cloudflare Page Shield
    Backed by our world-class threat intelligence and machine learning capabilities, Page Shield helps defend against client-side attacks that target vulnerable JavaScript dependencies. Detect and mitigate browser supply chain attacks with machine learning-based protection. Get instant notifications when new scripts are detected, marked as malicious, or loaded from unknown domains. Reduce third-party vendor risk and address client-side requirements like GDPR, PCI, and more. Page Shield simplifies...
  • 13
    Casbin

    Casbin

    Casbin

    Casbin is an open-source authorization library that supports various access control models, including Access Control Lists (ACL), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). It is implemented in multiple programming languages such as Golang, Java, C/C++, Node.js, JavaScript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter), and Elixir, providing a consistent API across different platforms. Casbin abstracts...
    Starting Price: Free
  • 14
    OpenFGA

    OpenFGA

    The Linux Foundation

    OpenFGA is an open source authorization solution that enables developers to implement fine-grained access control using a user-friendly modeling language and APIs. Inspired by Google's Zanzibar paper, it supports various access control models, including Relationship-Based Access Control (ReBAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). OpenFGA offers SDKs for multiple programming languages, such as Java, .NET, JavaScript, Go, and Python, facilitating seamless...
    Starting Price: Free
  • 15
    Voicekey

    Voicekey

    Voicekey

    Voicekey is a patented voice biometrics product using stateless Neural Network (NN) Technology/AI to help solve non-face-to-face identity authentication and identification security challenges. Voicekey is at’ heart’ a computational NN/AI engine that is consumed on-device or server based as part of an identity security application. Voicekey processes involved in enrolment and verification are consumed and accessed on-device or server based using an SDK depending on the platform (Java, i...
  • 16
    PatrOwl

    PatrOwl

    PatrOwl.io

    PatrowlHears supports your vulnerability watch process for your internal IT assets (OS, middleware, application, Web CMS, Java/.Net/Node library, network devices, IoT). Vulnerabilities and related exploitation notes at put at your disposal. Scan continuously websites, public IP, domains and subdomains for vulnerabilities, misconfigurations. Perform the reconnaissance steps, including the asset discovery and the full-stack vulnerability assessment and the remediation checks. Automation of static...
    Starting Price: €49 per month
  • 17
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    ... application with a few lines of code. Send email notifications to your customers based on selected triggers. e-Commerce integration to automate the license key generation process with the ordering process. Analytics to understand usage behavior. Self Help portal for your customers. Check for Updates for your application. Trial Registration Form to allow your customers to request a trial license.
    Leader badge
    Starting Price: $200 one-time payment
  • 18
    Radware Bot Manager
    ... tools in the market, Radware Bot Manager uses an API-based approach, thereby ensuring seamless integration with your existing infrastructure. Radware Bot Manager provides Cloud Connectors and Web server plugins to get started quickly. A lightweight REST API code and JavaScript inserted on your page provides complete bot protection.
  • 19
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight...
  • 20
    Cequence Security

    Cequence Security

    Cequence Security

    ..., and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.
  • 21
    Feroot

    Feroot

    Feroot Security

    ...-side attack surface. With Feroot Inspector, businesses can scan, monitor, and enforce security controls to prevent data loss incidents within software logic on the front end caused by compromised JavaScript, third parties and configuration weaknesses. Our data protection capabilities significantly minimize time- and labor-intensive code reviews and threat analysis, and remove the ambiguity associated with client-side security detection, response, and prevention.
  • 22
    Crashtest Security

    Crashtest Security

    Crashtest Security

    Crashtest Security is a SaaS-based security vulnerability scanner allowing agile development teams to ensure continuous security before even hitting Production. Our state-of-the-art dynamic application security testing (DAST) solution integrates seamlessly with your dev environment and protects multi-page and JavaScript apps, as well as microservices and APIs. Set up Crashtest Security Suite in minutes, get advanced crawling options, and automate your security. Whether you want to see...
    Starting Price: €35 per month
  • 23
    YAG-Suite
    ... in their understanding of the vulnerability causes and impacts. Its contextual remediation support them in fixing efficiently the problems while improving their secure coding skills. Additionally, YAG-Suite's unprecedented 'code mining' support security investigations of an unknown application with mapping all relevant code features and security mechanisms and offers querying capabilities to search for 0-days or non automatically detectable risks. PHP, Java and Python are supported. JS, C/C++ coming soon
    Starting Price: From €500/token or €150/mo
  • 24
    WebScanner

    WebScanner

    DefenseCode

    ...Scanner supports major web technologies such as HTML, HTML5, Web 2.0, AJAX/jQuery, JavaScript and Flash. It is designed to execute more than 5000 Common Vulnerabilities and Exposures tests for various web server and web technology vulnerabilities. WebScanner is capable of discovering more than 60 different vulnerability types (SQL Injection, Cross Site Scripting, Path Traversal, etc.), including OWASP Top 10.
  • 25
    OpenText Dynamic Application Security Testing
    ... in CI/CD pipelines, reducing manual efforts while accelerating security feedback. It covers modern web technologies like HTML5, JSON, AJAX, JavaScript, and HTTP2 to ensure comprehensive testing. Flexible deployment options allow organizations to run the solution on public cloud, private cloud, or on-premises environments.
  • 26
    IBM Cloud Data Shield
    IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host, providing data-in-use protection. IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for My...
  • 27
    Oracle Web Application Firewall
    ... 250 predefined OWASP, application, and compliance-specific rules. Protect applications deployed in Oracle Cloud Infrastructure, on-premises, and in multicloud environments with access controls based on geolocation data, whitelisted and blacklisted IP addresses, HTTP URL, and HTTP header. Identify and block malicious bot traffic with an advanced set of verification methods, including JavaScript, CAPTCHA, device fingerprinting, and human interaction algorithms.
  • 28
    Memberstack

    Memberstack

    Memberstack

    Beautiful user logins & payments for any website. You control where your website & content lives. 1. Install a JavaScript code snippet to your website. 2. Set membership plans, pricing and permissions for your website. 3. Manage members through a simple dashboard. Say goodbye to authentication and payment problems — gate website pages and content to create web applications. Start accepting payments quickly with our one-click Stripe integration. 100% free, unlimited trial — upgrade only when you...
    Starting Price: $25 per month
  • 29
    Arachni

    Arachni

    Arachni

    ... command line scanner utility, to a global high performance grid of scanners, to a Ruby library allowing for scripted audits, to a multi-user multi-scan web collaboration platform. In addition, its simple REST API makes integration a cinch. Finally, due to its integrated browser environment, it can support highly complicated web applications which make heavy use of technologies such as JavaScript, HTML5, DOM manipulation and AJAX.
  • 30
    DigitSec S4

    DigitSec S4

    DigitSec

    ... vulnerabilities with its four integrated scans for fast and effortless detection. Static Source Code Analysis (SAST), Interactive Runtime Testing (IAST), Software Composition Analysis (SCA), and Cloud Security Configuration Review. Our static application security testing (SAST) engine is a core feature of S4, providing automated scanning and analysis of all custom source code in your Salesforce Org including Apex, VisualForce, Lightning Web Components, and related-JavaScript.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next