Applications

This module explores applications, focusing on the development, deployment, and security of software applications, examining vulnerabilities and strategies for securing applications against potential threats.

Portal > Cybersecurity > Applications

Curriculum Builder

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Sandvine. “The Global Internet Phenomena Report.” Sandvine, January 2023.

https://www.sandvine.com/hubfs/Sandvine_Redesign_2019/Downloads/2023/reports/Sandvine%20GIPR%202023.pdf

Honda, Michio, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley, and Hideyuki Tokuda. “Is It Still Possible to Extend TCP?” In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, 181–94. Berlin Germany: ACM, 2011.

https://doi.org/10.1145/2068816.2068834

Baset, Salman A., and Henning Schulzrinne. “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol.” arXiv, December 4, 2004.

https://doi.org/10.48550/arXiv.cs/0412017

Thank you for signing up to our newsletter!

Thank you! RSVP received for Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Thank you for applying! We will be in touch.

Apply for: Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Loading...

Loading…