Software Life Cycle and Management considerations

Loading...
Ver programa

Revisiones

4.7 (22 calificaciones)
  • 5 stars
    18 ratings
  • 4 stars
    2 ratings
  • 3 stars
    2 ratings
De la lección
Simple software compromises
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!

Impartido por:

  • Albert Glock

    Albert Glock

    Instructor

Explora nuestro catálogo

Inscríbete de manera gratuita y obtén recomendaciones personalizadas, actualizaciones y ofertas.