Learn Web Security
Study Web Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
computer science
computer science
By: James Tyler
1.1 number systems, 1.2 text, sound and images, 1.3 storage and compression...19Decks246Flashcards1Learner -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Christoph Todd
Common Terms, Zero Day Attack, Miscellaneous Computer Processes (stuff I find and look up along the way)...66Decks320Flashcards6Learners -
UOFG_CYBER_SECURITY
UOFG_CYBER_SECURITY
By: michal wozniak
Lecture 1 - Introduction, Lecture 2 - Networks, Lecture 3 - Access Control Basics...18Decks236Flashcards1Learner -
ICT-Unit 2
ICT-Unit 2
By: Aaron Mensah
Holders of information, Types of information storage media, Types of information access and storage devices...31Decks223Flashcards3Learners -
CompTIA PenTest+
CompTIA PenTest+
By: Grayden Odum
PenTest Methodologies, Rules of Engagement, White Box Support Resources...30Decks195Flashcards9Learners -
CSC2004: Cyber Security Fundamentals
CSC2004: Cyber Security Fundamentals
By: Jun Xian Lim
Summary: Lecture 13, Intro to Cryptography & Asymmetric Cryptography: Lecture 1, Access Control: Lecture 2...11Decks56Flashcards2Learners -
Unit 2 IT Revision - Roeesah
Unit 2 IT Revision - Roeesah
By: Roeesah ALLI
LO1. Understand Where Information Is Held Globally And How It Is Transmitted, 1.1 HOLDERS OF INFORMATION, 1.2 - Types of Information Storage Media...35Decks484Flashcards2Learners -
Server Side Scripting
Server Side Scripting
By: Aleysha Mullen
Regex, PHP, MySQL...4Decks20Flashcards2Learners -
Ethical Hacking
Ethical Hacking
By: phil bieni
Kahoot - Intro to Ethical hacking, Common Attack flows & Attack Terminology - EH-01-P1, Kahoot - EH-02-P1 Network Scanning...12Decks115Flashcards5Learners -
SP 2010 Original Study Library
SP 2010 Original Study Library
By: Anna Singletary
(Anna Notes) SP TS667 CH 1-4:---------------------- [C1: Creating a SharePoint 2010 Intranet / C2: Administering and Automating SharePoint / C3: Managing Web Applications / CH4 : Administering and securing SharePoint Content ], (Anna Notes) SP TS667 CH 5: Service Applications and Managed Metadata Service, Scenario Based Questions from Quiz Let...6Decks203Flashcards3Learners -
Linux
Linux
By: E Mi
Linux file system, Bash scripting, Cron jobs...5Decks135Flashcards1Learner -
CompTIA
CompTIA
By: K Fick
Lesson 1, Lesson 8: Using Databases, Lesson 11: Using Device Interfaces...12Decks162Flashcards1Learner -
IT Security 2 - RWTH
IT Security 2 - RWTH
By: Hannes Krogmann
2. Malware, 3. Botnets, 4. Malware Countermeasures...14Decks50Flashcards3Learners -
TDTS04
TDTS04
By: Cecilia Petersson
L1. Why do we need protocol layering?, DS L1. What are main design goals in DS?, S1. How do config errors made in OSPF vs BGP affect Internet operation?...54Decks743Flashcards6Learners -
OU M362 SAQs
OU M362 SAQs
By: Ian Baker
Unit 5 Distributed systems: Software architecture and communication, Unit 6 The database tier: Handling transactions and concurrency, Unit 7 The business tier...12Decks228Flashcards1Learner -
ASP.NET Security
ASP.NET Security
By: Chris Fildes
OWASP Top 10 Security Vulnerabilities, Securing An ASP.NET Web Application/API, Authentication Methods in ASP.NET3Decks35Flashcards1Learner -
BIS BABE
BIS BABE
By: Selina Wong
1. Introduction, 2. Macro forces & information age, 3. Competitive advantage and strategy...18Decks228Flashcards1Learner -
Cyber Security
Cyber Security
By: Aiden Beck
Risk Management, Internet Of Things, Pen Testing...19Decks86Flashcards2Learners -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture...30Decks240Flashcards5Learners -
ICT
ICT
By: Tengku Humaira Tengku Naufal
WEEK 3: THE INTERNET AND THE WEB, WEEK 4: COMMUNICATIONS AND NETWORKS, WEEK 5: PRIVACY, SECURITY AND ETHICS3Decks64Flashcards1Learner -
OSFA_Specialist
OSFA_Specialist
By: Daniel Egan
Modes of inheritance, Types of variants, NGS chemistry...29Decks269Flashcards1Learner -
Gestaltung
Gestaltung
By: Benjamin Rampolt
M_dA: Grundlagen zu digitalen Bildern, M_dA: Grundlagen der allgemeinen Optik, M_dA: Digitalfotografie...40Decks114Flashcards4Learners -
CS2003 - Networks
CS2003 - Networks
By: Henry Williams
1. Concepts and Terms (i) & 2. TCP Sockets, 3. Servers, 4. HTTP...12Decks107Flashcards3Learners -
az-204 microsoft docs
az-204 microsoft docs
By: Unknown Unknown
Create serverless applications | Choose the best Azure service to automate your business processes, Create serverless applications | Create serverless logic with Azure Functions, Create serverless applications | Create a long-running serverless workflow with Durable Functions...17Decks163Flashcards4Learners -
Se
Se
By: Komal Kumari
se, web security, Hardware based software Protection3Decks17Flashcards2Learners -
UCWD
UCWD
By: Sebastian Kampe
01 Web 2.0 + Social software, 02 Strategic Planning, 03 Interfaces and Technology...8Decks73Flashcards1Learner -
Computer Science
Computer Science
By: Ayemwosa Osawe
Chapter 1 - Processor Components (1.1), Chapter 2 - Processor Performance (1.1), Chapter 3 - Types of Processor (1.1)...32Decks219Flashcards3Learners -
ICT
ICT
By: Thobo Ferguson
ICT applications, Direct Input Devices, Web Authoring...5Decks31Flashcards1Learner -
System Design
System Design
By: Eric Angeloni
API, Database, Scaling...8Decks36Flashcards1Learner -
Javascript refrence
Javascript refrence
By: Travis R
Functions, Array Obj properties and methods, General Javascript knowledge and concepts...40Decks120Flashcards4Learners