Alăturați-vă nouă la Binding Hook Live pe 27 octombrie la Underbelly Boulevard Soho din Londra
Alăturați-vă nouă la Binding Hook Live

Applications

This module explores applications, focusing on the development, deployment, and security of software applications, examining vulnerabilities and strategies for securing applications against potential threats.

Portal > Cybersecurity > Applications

Constructor de curriculum

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Sandvine. “The Global Internet Phenomena Report.” Sandvine, January 2023.

https://www.sandvine.com/hubfs/Sandvine_Redesign_2019/Downloads/2023/reports/Sandvine%20GIPR%202023.pdf

Honda, Michio, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley, and Hideyuki Tokuda. “Is It Still Possible to Extend TCP?” In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, 181–94. Berlin Germany: ACM, 2011.

https://doi.org/10.1145/2068816.2068834

Baset, Salman A., and Henning Schulzrinne. “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol.” arXiv, December 4, 2004.

https://doi.org/10.48550/arXiv.cs/0412017

Vă mulțumim pentru că v-ați abonat la newsletter-ul nostru!

Thank you! RSVP received for Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Vă mulțumim pentru candidatură! Vă vom contacta.

Apply for: Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Încărcare...

Încărcare...