Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
COMPUTER NETWORKS
COMPUTER NETWORKS
By: Sifa Ngari
INTRODUCTION TO COMPUTER NETWORKS, TYPES OF NETWORKS, NETWORKING EQUIPMENT ...23Decks463Flashcards127Learners -
Security+
Security+
By: Matt Miller
Chapter 1: Measuring and Weighing Risk, Chapter 2: Monitoring and Diagnosing Networks, Port Numbers ...13Decks484Flashcards124Learners -
Salesforce Admin study 06152019
Salesforce Admin study 06152019
By: Tina Mccauley - OIT
Orgainiation Setup, Sales and marketing applications, Activity management and collaboration ...10Decks243Flashcards57Learners -
Net+ exam
Net+ exam
By: kim kim
Chapter 2: Network Models, Chapter 3: Cabling and Topology, Chapter 4: Ethernet Basics ...33Decks1,140Flashcards81Learners -
Security+ SY601 RC
Security+ SY601 RC
By: Roman Cano
1: 5 Common Attacks, 1: 6 Understanding Vulnerability Types, 1: 7 Vulnerability Scanning ...29Decks640Flashcards5Learners -
Patent Bar: MPEP
Patent Bar: MPEP
By: Jacqueline K
MPEP Chapters, 100 Sections: Secrecy, Access, National Security and Foreign Filing, 200 Sections: Types, Cross-Noting, and Status of Application ...31Decks1,151Flashcards64Learners -
Java OCP 11
Java OCP 11
By: Unknown Unknown
Chapter 1, Chapter 2, Chapter 3 ...22Decks997Flashcards87Learners -
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
By: Bryan Phillips
Implement and manipulate document structures and objects (24%), Implement program flow (25%), Access and secure data (26%) ...4Decks477Flashcards106Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards15Learners -
CCEA GCSE Digital Technology Unit 1
CCEA GCSE Digital Technology Unit 1
By: Alan Templeton
Chapter 1 - Digital Data, Chapter 2 - Software, Chapter 3 - Database Applications ...10Decks280Flashcards39Learners -
Cisco Devnet
Cisco Devnet
By: Wayne Knight
Software Dev and Design, Using APIs, Application deployment and Security ...5Decks165Flashcards23Learners -
Salesforce - Administrator Certification
Salesforce - Administrator Certification
By: Michael Hamilton
Setup and Objects Scenarios, Setup and Objects Flashcards, Security and Data Management Scenarios ...8Decks129Flashcards22Learners -
Certified Ethical Hacker
Certified Ethical Hacker
By: James Carrion
Essential Knowledge, Reconnaissance, Scanning and Enumeration ...13Decks789Flashcards17Learners -
Patent Bar
Patent Bar
By: Mike Young
Patent Bar: The Law, Claim Drafting: 35 USC 112, Review Question Points ...27Decks780Flashcards396Learners -
CKAD Preparation
CKAD Preparation
By: Marian Ratajczak
Recap Core Concepts, Configuration, Config - ConfigMaps ...35Decks401Flashcards2Learners -
CCSP-certification FA
CCSP-certification FA
By: Ferencz Arendt
CCSP study FA, Architectural Concepts, Architectural Concepts ...5Decks90Flashcards43Learners -
Certified Kubernetes Administrators Certification (CKA)
Certified Kubernetes Administrators Certification (CKA)
By: Collin Sanford
Core Concepts, Scheduling, Logging and Monitoring ...8Decks220Flashcards21Learners -
Fundamentals of Information Security - C836
Fundamentals of Information Security - C836
By: Cassidy Nelson
Fundamentals of Information Security - C836, Business of IT Applications2Decks293Flashcards18Learners -
Spring professional certification
Spring professional certification
By: Tho GG
0-Notes, 10-Spring Overview, 12-Java Configuration ...18Decks437Flashcards35Learners -
AS Digital Technology
AS Digital Technology
By: kate kelly
2.3.1 Architecture, Fetch Execute Cycle, 2.4.2 Website Development ...22Decks365Flashcards31Learners -
COMP30023
COMP30023
By: Caiti and Commerce of Reynard
Definitions, Exam Questions, Introduction ...17Decks727Flashcards15Learners -
Data Engineer Associate
Data Engineer Associate
By: Chris Lombardi
Data Engineering Basics, Storage Technologies, Databases ...8Decks502Flashcards10Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards9Learners -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code ...20Decks650Flashcards1Learner -
AWS Architect Associate
AWS Architect Associate
By: Fernando Guerra
Resilient Architectures - Availability, Resilient Architectures - Environment setup, Resilient Architectures - CloudFormation ...30Decks349Flashcards4Learners -
AWS Final Exam
AWS Final Exam
By: Jacqueline Huynh
Module 1 - Introduction to Amazon Web Services, Module 2 - Compute in the Cloud, Module 3 - Global Infrastructure and Reliability ...50Decks541Flashcards73Learners -
Advanced Computer Networks
Advanced Computer Networks
By: Hannah Foley
Transport Layer, Application Layer, Network Security3Decks306Flashcards1Learner -
IGCSE ICT
IGCSE ICT
By: Ngan Nguyen
Section 1 - Types and components of computer systems, Section 2 - Input and output devices, Section 3 - Storages devices and media ...10Decks326Flashcards1,944Learners -
CompTIA A+ 1002
CompTIA A+ 1002
By: Kevin P
1) OS & Application Installation, 1) OS Features & Utilities, 1) Command Line ...13Decks367Flashcards11Learners -
Computer Science (Year 2)
Computer Science (Year 2)
By: Daniel Hole
Software Development, Computer Languages and Representations, Network and Computer Security ...6Decks1,132Flashcards2Learners