Dołącz do nas podczas Binding Hook Live 27 października w Underbelly Boulevard Soho w Londynie
Dołącz do nas na Binding Hook Live

Applications

This module explores applications, focusing on the development, deployment, and security of software applications, examining vulnerabilities and strategies for securing applications against potential threats.

Portal > Cyberbezpieczeństwo > Applications

Kreator programów nauczania

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Sandvine. “The Global Internet Phenomena Report.” Sandvine, January 2023.

https://www.sandvine.com/hubfs/Sandvine_Redesign_2019/Downloads/2023/reports/Sandvine%20GIPR%202023.pdf

Honda, Michio, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley, and Hideyuki Tokuda. “Is It Still Possible to Extend TCP?” In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, 181–94. Berlin Germany: ACM, 2011.

https://doi.org/10.1145/2068816.2068834

Baset, Salman A., and Henning Schulzrinne. “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol.” arXiv, December 4, 2004.

https://doi.org/10.48550/arXiv.cs/0412017

Dziękujemy za zapisanie się do naszego newslettera!

Thank you! RSVP received for Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Dziękujemy za zgłoszenie! Będziemy w kontakcie.

Apply for: Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Ładowanie...

Ładowanie...