Software Life Cycle and Management considerations

Loading...
来自 University of Colorado System 的课程
Software Design Threats and Mitigations
13 个评分
University of Colorado System
13 个评分
课程 4(共 4 门,Specialization Secure Software Design
从本节课中
Simple software compromises
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!

与讲师见面

  • Albert Glock
    Albert Glock
    Instructor
    Computer Science

探索我们的目录

免费加入并获得个性化推荐、更新和优惠。