Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
DTDDB 2021 SEM <3
DTDDB 2021 SEM <3
By: Julie Nielsen
Introduction to computational thinking, What is an Information System: Digital Technologies in a Global Society, How Businesses Use Digital Technologies11Decks235Flashcards8Learners -
BTM 200
BTM 200
By: Komal Patel
BTM 200 FINAL, Unit 1 – Computer and Information Ethics, Unit 2 – Computer parts8Decks276Flashcards1Learner -
AWS Arc Associate
AWS Arc Associate
By: Tammy Walters
Arc VPN, Network Connectivity Options, Security and Monitoring24Decks390Flashcards1Learner -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS)35Decks506Flashcards3Learners -
CISSP
CISSP
By: Dylan Myers
Chapter 1: Security Governance Through Principles and Policies, Chapter 2: Personnel Security and Risk Management Concepts, Chapter 3: Business Continuity Planning9Decks434Flashcards1Learner -
Net+
Net+
By: Brooke Kohutka
Compare And Contrast OSI Model Layers, Configure SOHO Networks, Deploying Ethernet Cabling18Decks434Flashcards1Learner -
CCSK Practice Tests - CSA Security Guidance v4
CCSK Practice Tests - CSA Security Guidance v4
By: Chris Nadeau
Domain 1: Cloud Computing Concepts and Architectures, Domain 2: Governance and Enterprise Risk Management, Domain 3: Legal Issues, Contracts, and Electronic Discovery16Decks329Flashcards3Learners -
Pharm 151 - self inflicted lobotomy
Pharm 151 - self inflicted lobotomy
By: Matthew Miller
Week 1, Week 2 - privacy and security, Week 3 - Foundation and Application of Health Informatics8Decks245Flashcards1Learner -
Patent Bar Study
Patent Bar Study
By: Travis Mendoza
Patent Bar: The Law, Claim Drafting: 35 USC 112, Review Question Points27Decks779Flashcards1Learner -
3. Architecture and Design
3. Architecture and Design
By: Matthew Schroeder
3.1 Use cases and purpose for frameworks, best practices, and secure configuration guides., 3.2 Implement secure network architecture concepts, 3.3 Implement secure systems design.8Decks124Flashcards1Learner -
igcse ict
igcse ict
By: Robert Yeo
Section 1 - Types and components of computer systems, Section 2 - Input and output devices, Section 3 - Storages devices and media10Decks326Flashcards47Learners -
CCSK v4 flashcards
CCSK v4 flashcards
By: Mohammed Al-Meshari
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery11Decks238Flashcards10Learners -
Civil Litigation
Civil Litigation
By: Estelle Chambers
Costs orders, Costs, Pre-Action Conduct14Decks286Flashcards6Learners -
Salesforce Advanced Administrator Exam Prep
Salesforce Advanced Administrator Exam Prep
By: David Veras
Security And Access, Objects And Applications, Auditing and Monitoring I10Decks112Flashcards6Learners -
Information Security
Information Security
By: Hanan Timraz
General Security Concepts, Cryptography, Key Management13Decks152Flashcards6Learners -
CEH Exam Guide 3rd Ed, for CEH Exam v9
CEH Exam Guide 3rd Ed, for CEH Exam v9
By: Stephen Holden
Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking), Chapter 2 - Reconnaissance (Footprinting and Reconnaissance), Chapter 3 - Scanning and Enumeration (Scanning Networks)17Decks545Flashcards41Learners -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security15Decks567Flashcards2Learners -
Cantril
Cantril
By: Ser Jaime
Fundamentals, AWS accounts, IAM Basics38Decks967Flashcards5Learners -
Cyber
Cyber
By: Bob OBrien
Section 1: Understanding Security Fundamentals, Section 2: Implementing Public Key Infrastructure, Section 3: Investigating Identity and Access Management12Decks489Flashcards3Learners -
ethical hacking
ethical hacking
By: Barbara Workman
Information Security Fundamentals, Ethical Hacking Fundamentals, Information Security Threats and Vulnerability Assessment13Decks222Flashcards61Learners -
Cisco ICND1 Exam Prep
Cisco ICND1 Exam Prep
By: Ben Rubert
Chapter 2 Flash Cards - OSI Model, Chapter 3 Flash Cards - LANs, Chapter 4 Flash Cards - WANs6Decks199Flashcards35Learners -
Dynatrace
Dynatrace
By: Hazaq Naeem
Introduction - Managed, Introduction - SaaS, Infrastructure Monitoring10Decks93Flashcards10Learners -
compuer technician
compuer technician
By: mike c
BIOS AND UEFI, RAID, partitions30Decks515Flashcards5Learners -
Programming
Programming
By: Albert van der Merwe
Important Javascript facts, Application Accessibility Concepts, Programming patterns and techniques23Decks404Flashcards1Learner -
Digital Tech
Digital Tech
By: Daniel you
Digital Data, Software, Data base10Decks209Flashcards5Learners -
Civil Litigation
Civil Litigation
By: Ella Fornsworth
CPR and Overriding Objective (W2), Costs (W2), Pre-Action Conduct and ADR (W2)20Decks778Flashcards13Learners -
Devasc module 5
Devasc module 5
By: Javier Hernández
Chapter 5, Chapter 4, Chapter 6 Application deployment and security3Decks130Flashcards1Learner -
Web Application and Services
Web Application and Services
By: Ade Banj
1. Introduction to Web Applications, 5. Security, 2. Web Application Development3Decks53Flashcards2Learners -
Network +
Network +
By: Adam Hornfeck
Network Models, Cabling and Topology, Ethernet Basics15Decks355Flashcards1Learner -
INFOSYS 727
INFOSYS 727
By: Kinzi Catalano
Risk Management Continue, Informationn Security And Risk Management, Security Management54Decks633Flashcards1Learner