Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Security+
Security+
By: Sean Shirley
Basics and fundamentals, General Security threats, Generally Mitigating Threats41Decks807Flashcards1Learner -
AS Digital Technology
AS Digital Technology
By: kate kelly
2.3.1 Architecture, Fetch Execute Cycle, 2.4.2 Website Development22Decks365Flashcards25Learners -
Security+
Security+
By: Matt Miller
Chapter 1: Measuring and Weighing Risk, Chapter 2: Monitoring and Diagnosing Networks, Port Numbers13Decks484Flashcards124Learners -
A Cloud Guru - AWS
A Cloud Guru - AWS
By: Srinivasan J
IAM, Infra, S311Decks682Flashcards4Learners -
► Security+
► Security+
By: 💜 Languages
Chapter 1: Measuring and Weighing Risk, Chapter 2: Monitoring and Diagnosing Networks, Port Numbers13Decks484Flashcards63Learners -
Security+
Security+
By: Taimoor Fayyaz
Ports, Basics, Malware22Decks583Flashcards1Learner -
CS4203: Computer Security
CS4203: Computer Security
By: Seamus Bonner
Introduction, Cryptography, Hashing19Decks522Flashcards13Learners -
Computer Science IGCSE
Computer Science IGCSE
By: SL ng
CS Key Terms, Networking and the Internet, Revision notes AQA9Decks246Flashcards428Learners -
Security+
Security+
By: Dillan Beckelheimer
Chapter 2: Monitoring and Diagnosing Networks, Security+ Questions, Chapter 3: Understanding Devices and Infrastructure8Decks297Flashcards92Learners -
CISSP - Security Management
CISSP - Security Management
By: Tim Pelland
CIA Triad, Control Types, OSI Models12Decks831Flashcards27Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks29Decks377Flashcards5Learners -
Computer Security
Computer Security
By: Ben Shef
1. Network security: Networking Principles, 2. Network security: ARP, TCP/IP and its vulnerabilities, 3. Cryptography: introduction18Decks267Flashcards26Learners -
Java OCP 11
Java OCP 11
By: Unknown Unknown
Chapter 1, Chapter 2, Chapter 322Decks997Flashcards69Learners -
CompTIA Security+
CompTIA Security+
By: Salewa Aderonmu
Lesson 7 - Questions, Lesson 8 - Questions, Lesson 9 - Questions28Decks1,104Flashcards3Learners -
Net+ exam
Net+ exam
By: kim kim
Chapter 2: Network Models, Chapter 3: Cabling and Topology, Chapter 4: Ethernet Basics33Decks1,140Flashcards61Learners -
Sem 1-AHEAD_Cyber_Security
Sem 1-AHEAD_Cyber_Security
By: Hemant Kumar
Python Modules Types, Python Methods, Memory & Learning27Decks585Flashcards2Learners -
Salesforce Admin study 06152019
Salesforce Admin study 06152019
By: Tina Mccauley - OIT
Orgainiation Setup, Sales and marketing applications, Activity management and collaboration10Decks243Flashcards59Learners -
Security+
Security+
By: Richard Romick
Chapter 3: Cryptography, Common Ports, Chapter 4: Network Connectivity9Decks388Flashcards1Learner -
9569 H2 Computing
9569 H2 Computing
By: Ng Jun Siang
Data Structures and Abstract Data Types, Object Oriented Programming, Recursion15Decks151Flashcards51Learners -
CompTIA - Network+
CompTIA - Network+
By: Jason Andrew
Network Models, Cabling and Topology, Ethernet Basics15Decks591Flashcards9Learners -
Introduction to IT Security
Introduction to IT Security
By: Mathias Unknown
Goals and Principles - What Is Security, Goals and Principles - Privacy, Goals and Principles - Design Principles for Secure Systems11Decks127Flashcards25Learners -
OCP Java SE 17 (1Z0-829)
OCP Java SE 17 (1Z0-829)
By: Mikołaj Telus
Chapter 1, Chapter 2, Chapter 321Decks1,014Flashcards22Learners -
Computer and Network Security
Computer and Network Security
By: Kaya Stone
History of Computer Security, Access Control, Security Mechanisms of UNIX10Decks281Flashcards6Learners -
Google Cloud Digital Leader
Google Cloud Digital Leader
By: Katherine Malewski
Intro to Digital Transformation, Innovating with Google Cloud, Infrastructure & Application Modernization with Google CLoud5Decks94Flashcards79Learners -
Patent Bar: MPEP
Patent Bar: MPEP
By: Jacqueline K
MPEP Chapters, 100 Sections: Secrecy, Access, National Security and Foreign Filing, 200 Sections: Types, Cross-Noting, and Status of Application31Decks1,151Flashcards45Learners -
Patent Bar
Patent Bar
By: Mike Young
Patent Bar: The Law, Claim Drafting: 35 USC 112, Review Question Points27Decks780Flashcards319Learners -
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
By: Bryan Phillips
Implement and manipulate document structures and objects (24%), Implement program flow (25%), Access and secure data (26%)4Decks477Flashcards98Learners -
Security+ SY601 RC
Security+ SY601 RC
By: Roman Cano
1: 5 Common Attacks, 1: 6 Understanding Vulnerability Types, 1: 7 Vulnerability Scanning29Decks640Flashcards5Learners -
COMPUTER NETWORKS
COMPUTER NETWORKS
By: Sifa Ngari
INTRODUCTION TO COMPUTER NETWORKS, TYPES OF NETWORKS, NETWORKING EQUIPMENT23Decks463Flashcards65Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks.45Decks887Flashcards13Learners