Software Life Cycle and Management considerations

En provenance du cours de University of Colorado System
Software Design Threats and Mitigations
3 notes
University of Colorado System
3 notes
Cours 4 sur 4 dans Specialization Secure Software Design
À partir de la leçon
Simple software compromises
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!

Rencontrer les enseignants

  • Albert Glock
    Albert Glock
    Computer Science