Learn Secure Software Design
Study Secure Software Design using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(16)
Decks
Flashcards
Learners
-
computer science
computer science
By: James Tyler
1.1 number systems, 1.2 text, sound and images, 1.3 storage and compression ...19Decks246Flashcards1Learner -
information management
information management
By: Teresa Handawi
Week 7&8 Social Media IS, Digital Marketing, Week 9 - Smart Accounting Information Security Management, Business Continuity Planning, Week 10 - Organizations and IS ...11Decks124Flashcards1Learner -
CISSP - 2021 Handerhan Notes
CISSP - 2021 Handerhan Notes
By: Ashley Joseph
Exam Notes, Information Security Governance & Risk Management, Asset Security ...10Decks44Flashcards2Learners -
Computing
Computing
By: Shannon Blyth
Computational Thinking, Algorithms And Programming, Defensive Design, 2.5 Programming Languages and IDEs ...5Decks138Flashcards1Learner -
Basic Definitions to Memorize
Basic Definitions to Memorize
By: bill cooey
Software Testing, General, Software Design ...5Decks28Flashcards1Learner -
Computer Science
Computer Science
By: Henry Green
Defensive Design, CPU, Memory ...45Decks200Flashcards1Learner -
Network Administration and System Security
Network Administration and System Security
By: Talla Michael
Subnetting, Terminology, Protocols ...8Decks78Flashcards1Learner -
ICT A Level
ICT A Level
By: Darren Nott
1b Investigation methods, 1c Prototyping & RAD *, 1d Testing & Test Plans * ...54Decks164Flashcards8Learners -
TLS Exam
TLS Exam
By: Michelle Pantelouris
Computer Systems: Hardware, Software and Troubleshooting, Computer Networks: Design, Components and Security, Network Architecture3Decks53Flashcards1Learner -
INF1505
INF1505
By: GEORGINA BOSHIELO
AN INTRODUCTION TO NFORMATION SYSTEM, INFORMATION SYSTEMS IN ORGANIZATIONS, HARDWARE : INPUT , PROCESSING , OUTPUT NAD STORAGE DEVICES ...13Decks17Flashcards2Learners -
CompTIA Security+ Certification Exam
CompTIA Security+ Certification Exam
By: Fareedah James
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks., 1.3 Explain threat actor types and attributes. ...37Decks130Flashcards1Learner -
CISSP
CISSP
By: Jennifer Toren
Chapter 1: Security Governance, Chapter 2: Personnel Security and Risk Management Concepts, Chapter 3: Business Continuity Planning ...21Decks19Flashcards2Learners -
GCE Digital Technology Unit 1
GCE Digital Technology Unit 1
By: P McIvor
Reasons for software development, Analysis, Design, development and testing ...8Decks17Flashcards1Learner -
SSAD
SSAD
By: Saloni Samsukha
What is a system?, System development methodologies: SYSTEM ANALYSIS AND DESIGN, System development models ...10Decks30Flashcards1Learner -
CISSP
CISSP
By: Timothy Southern
Chapter 1 - Security Governance Through Principles and Policies, Chapter 2 - Personnel Security and Risk Management Concepts, Chapter 3 - Business Continuity Planning ...22Decks38Flashcards1Learner -
Computer science
Computer science
By: Unknown Unknown
Software, Databases, Computer systems ...8Decks20Flashcards1Learner