Software Life Cycle and Management considerations

Loading...
Del curso dictado por Sistema Universitario de Colorado
Software Design Threats and Mitigations
3 ratings
Sistema Universitario de Colorado
3 ratings
Curso 4 de 4 en SpecializationSecure Software Design
De la lección
Simple software compromises
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!

Conoce a los instructores

  • Albert Glock
    Albert Glock
    Instructor
    Computer Science