Prisijunkite prie mūsų spalio 27 d. "Binding Hook Live" renginyje "Underbelly Boulevard Soho" Londone
Prisijunkite prie mūsų "Binding Hook Live

Applications

This module explores applications, focusing on the development, deployment, and security of software applications, examining vulnerabilities and strategies for securing applications against potential threats.

Mokymo programos kūrėjas

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Sandvine. “The Global Internet Phenomena Report.” Sandvine, January 2023.

https://www.sandvine.com/hubfs/Sandvine_Redesign_2019/Downloads/2023/reports/Sandvine%20GIPR%202023.pdf

Honda, Michio, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley, and Hideyuki Tokuda. “Is It Still Possible to Extend TCP?” In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, 181–94. Berlin Germany: ACM, 2011.

https://doi.org/10.1145/2068816.2068834

Baset, Salman A., and Henning Schulzrinne. “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol.” arXiv, December 4, 2004.

https://doi.org/10.48550/arXiv.cs/0412017

Dėkojame, kad užsiregistravote mūsų naujienlaiškiui!

Thank you! RSVP received for Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Dėkojame, kad pateikėte paraišką! Susisieksime su jumis.

Apply for: Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Pakraunama...

Pakraunama...