Software Life Cycle and Management considerations

Loading...
Ver programa

Revisiones

4.8 (34 calificaciones)
  • 5 stars
    85%
  • 4 stars
    9%
  • 3 stars
    6%
De la lección
Simple software compromises
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!

Impartido por:

  • Albert Glock

    Albert Glock

    Instructor

Explora nuestro catálogo

Inscríbete de manera gratuita y obtén recomendaciones personalizadas, actualizaciones y ofertas.