Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
fit1047
fit1047
By: prathna t
Motherboard, Booting, OS ...12Decks200Flashcards3Learners -
NAATI Simplified
NAATI Simplified
By: Julian Huynh
Drink Driving, Job Interview, Endoscopy ...49Decks1,063Flashcards2Learners -
* AWS Certified Solutions Architect - Associate
* AWS Certified Solutions Architect - Associate
By: Jana Dohman
Introduction, IAM & AWS CLI, EC2 Fundamentals ...28Decks879Flashcards10Learners -
ag-network A+
ag-network A+
By: Anti Gondu
Chapter 1, Chapter 1 - Sheet1, Chapter 2 ...22Decks1,900Flashcards1Learner -
CISSP Study Guide
CISSP Study Guide
By: Enosh Chang
Security Governance Through Principles and Policies, Personnel Security and Risk Management Concepts, Business Continuity Planning ...21Decks420Flashcards1Learner -
Comptia Security + Mike myers course
Comptia Security + Mike myers course
By: Kerry Gambrel
Chapter 1 Risk Management, Chapter 2 Cyrptography, Chapter 3 Identity and Account management ...12Decks760Flashcards1Learner -
CIS101
CIS101
By: Professor Stryker
Chapter 01: Introduction to the World of Computers, Chapter 02: The System Unit: Processing and Memory, Chapter 03: Storage ...17Decks694Flashcards121Learners -
Civil Litigation 2.0
Civil Litigation 2.0
By: Viktoria Winzer
1. General Matters, 2. Limitation - easier to revise straight from white book, 3. Pre-action Conduct ...26Decks1,232Flashcards24Learners -
Cisco DevNet Associates
Cisco DevNet Associates
By: Kerry Gambrel
Software Development - Software Design, Version Control, Coding Basics ...10Decks250Flashcards10Learners -
Certified application developer CAD
Certified application developer CAD
By: Merry Tameh
Multiple questions, Securing Applications Against Access from Other Applications, Importing Data ...16Decks267Flashcards2Learners -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS) ...35Decks506Flashcards5Learners -
TM129: Networking
TM129: Networking
By: patrick macpherson
Module 1: Communications in a connected world, Module 2: Online Connections, Module 4: Build a simple network ...19Decks834Flashcards7Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks. ...24Decks258Flashcards40Learners -
IT Essentials Chapter 5
IT Essentials Chapter 5
By: Jordan Allatt
Network Components and Types, Connection Types, Protocols, Standards and Services ...12Decks191Flashcards10Learners -
AWS Architect Associate
AWS Architect Associate
By: David Geneve
Management and Migration, Storage Solutions, Storage Security & Resiliency ...14Decks159Flashcards1Learner -
Digital Tech
Digital Tech
By: Daniel You
Digital Data, Software, Data base ...10Decks314Flashcards4Learners -
CompTIA Security +
CompTIA Security +
By: C Cessaro
Section 1 Risk Management, Section 2: Cryptography, Section 4: Tools of the Trade ...15Decks418Flashcards2Learners -
Security +
Security +
By: Jon-Paul Brune
Chapter 2 - Monitoring & Diagnosing Networks, Chapter 1 - Measuring & Weighing Risk, Chapter 3 - Understanding Devices & Infrastructure ...12Decks397Flashcards13Learners -
Patent Bar Study
Patent Bar Study
By: Travis Mendoza
Patent Bar: The Law, Claim Drafting: 35 USC 112, Review Question Points ...27Decks779Flashcards3Learners -
Cyber
Cyber
By: Bob OBrien
Section 1: Understanding Security Fundamentals, Section 2: Implementing Public Key Infrastructure, Section 3: Investigating Identity and Access Management ...12Decks489Flashcards4Learners -
Comptia Security + SY0-601
Comptia Security + SY0-601
By: Kerry Gambrel
Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack Indicators ...12Decks329Flashcards11Learners -
Security+ GCGH Chapter 7, Protecting Against Advanced Attacks
Security+ GCGH Chapter 7, Protecting Against Advanced Attacks
By: StuffOffYouStuff .
Comparing Common Attacks, Summarizing Secure Coding, Identifying Application Attacks3Decks60Flashcards1Learner -
Amazon Web Services (Whitepaper)
Amazon Web Services (Whitepaper)
By: Bari Ryczek
*Cloud Computing Models*, *Cloud Computing Deployment Models*, *AWS Services & Application Access* ...29Decks274Flashcards6Learners -
Comptia Security+
Comptia Security+
By: Cristi Náme
Attack Types, Application Attacks, Network Attacks ...8Decks169Flashcards1Learner -
Civil Litigation
Civil Litigation
By: Meg Cox
General Matters (Syllabus 1)., Limitation (Syllabus 2), Pre-action Conduct (Syllabus 3). ...24Decks1,228Flashcards94Learners -
AWS - Dev Associate
AWS - Dev Associate
By: Rebecca Preib
Name that AWS Service, 4. IAM + AWS CLI, 5. EC2 ...22Decks520Flashcards16Learners -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards2Learners -
Aye Dub S Ess AA Exam
Aye Dub S Ess AA Exam
By: Savvy Davis
Advanced VPC Networking, VPC Basics, AWS Fundamentals ...16Decks546Flashcards1Learner -
DTDDB 2021 SEM <3
DTDDB 2021 SEM <3
By: Julie Nielsen
Introduction to computational thinking, What is an Information System: Digital Technologies in a Global Society, How Businesses Use Digital Technologies ...11Decks235Flashcards8Learners -
Principles of Computer Networks
Principles of Computer Networks
By: Kristofer Fonagy
Chapter 1 - Network Models, Chaper 2 - Cabling and Topology, Chapter 3 - Ethernet Basics ...12Decks321Flashcards54Learners