Learn Web Security
Study Web Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Exploring Network Technologies and Tools
Exploring Network Technologies and Tools
By: Alfredo Virula
Basic Networking Protocols, File Transfer Use Case, Email and Web Use Cases ...7Decks76Flashcards4Learners -
AWS Certified Cloud Practitioner
AWS Certified Cloud Practitioner
By: Imani Adams
Module 1: Introduction to AWS Web Services, Module 2: Compute in the Cloud, Module 3: Global Infrastructure and Reliablity ...10Decks139Flashcards3Learners -
Computing
Computing
By: Jack Leslie
Design & Theory of Programming - Design Notation, Design & Theory of Programming - Readability, Design & Theory of Programming - Handling Data ...38Decks259Flashcards5Learners -
JBorn Web
JBorn Web
By: Дмитрий Романюк
1. Основы реляционных баз данных. Язык запросов SQL, 2. Java Data Base Connectivity (JDBC), Maven, 3. DataSource, Application Layering ...12Decks96Flashcards9Learners -
Ethical Hacking
Ethical Hacking
By: phil bieni
Kahoot - Intro to Ethical hacking, Common Attack flows & Attack Terminology - EH-01-P1, Kahoot - EH-02-P1 Network Scanning ...12Decks115Flashcards4Learners -
I.T Exam Unit 2
I.T Exam Unit 2
By: Connor Mason
Learning Outcomes:, LO1: World Wide Web Technologies, LO1: Storage Methods ...11Decks70Flashcards5Learners -
Cambridge Tech IT Unit 2
Cambridge Tech IT Unit 2
By: Skye Drinkwater
1.1 Holders Of Information, 1.2 Types Of Information Storage Media, 1.3 Types Of Information Access And Storage Devices ...29Decks253Flashcards5Learners -
IS4560 HACKING AND COUNTERMEASURES
IS4560 HACKING AND COUNTERMEASURES
By: Barbara Crable
IS4560 CH 1 "Evolution of Hacking", IS4560 CH 2 TCP/IP Review, IS4560 CH 3 Cryptographic Concepts ...15Decks160Flashcards24Learners -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Christoph Todd
Common Terms, Zero Day Attack, Miscellaneous Computer Processes (stuff I find and look up along the way) ...66Decks320Flashcards7Learners -
ICT-Unit 2
ICT-Unit 2
By: Aaron Mensah
Holders of information, Types of information storage media, Types of information access and storage devices ...31Decks223Flashcards3Learners -
I.T
I.T
By: George Manuel
1. Wireless Technology, 2. ICT legislation, 3. Web technologies ...7Decks66Flashcards2Learners -
CompTIA PenTest+
CompTIA PenTest+
By: Grayden Odum
PenTest Methodologies, Rules of Engagement, White Box Support Resources ...30Decks195Flashcards8Learners -
UOFG_CYBER_SECURITY
UOFG_CYBER_SECURITY
By: michal wozniak
Lecture 1 - Introduction, Lecture 2 - Networks, Lecture 3 - Access Control Basics ...18Decks236Flashcards1Learner -
CSC2004: Cyber Security Fundamentals
CSC2004: Cyber Security Fundamentals
By: Jun Xian Lim
Summary: Lecture 13, Intro to Cryptography & Asymmetric Cryptography: Lecture 1, Access Control: Lecture 2 ...11Decks56Flashcards2Learners -
Server Side Scripting
Server Side Scripting
By: Aleysha Mullen
Regex, PHP, MySQL ...4Decks20Flashcards2Learners -
SP 2010 Original Study Library
SP 2010 Original Study Library
By: Anna Singletary
(Anna Notes) SP TS667 CH 1-4:---------------------- [C1: Creating a SharePoint 2010 Intranet / C2: Administering and Automating SharePoint / C3: Managing Web Applications / CH4 : Administering and securing SharePoint Content ], (Anna Notes) SP TS667 CH 5: Service Applications and Managed Metadata Service, Scenario Based Questions from Quiz Let ...6Decks203Flashcards3Learners -
TDTS04
TDTS04
By: Cecilia Petersson
L1. Why do we need protocol layering?, DS L1. What are main design goals in DS?, S1. How do config errors made in OSPF vs BGP affect Internet operation? ...54Decks743Flashcards1Learner -
CompTIA
CompTIA
By: K Fick
Lesson 1, Lesson 8: Using Databases, Lesson 11: Using Device Interfaces ...12Decks162Flashcards1Learner -
Gestaltung
Gestaltung
By: Benjamin Rampolt
M_dA: Grundlagen zu digitalen Bildern, M_dA: Grundlagen der allgemeinen Optik, M_dA: Digitalfotografie ...40Decks114Flashcards4Learners -
ASP.NET Security
ASP.NET Security
By: Chris Fildes
OWASP Top 10 Security Vulnerabilities, Securing An ASP.NET Web Application/API, Authentication Methods in ASP.NET3Decks35Flashcards1Learner -
Cyber Security
Cyber Security
By: Aiden Beck
Risk Management, Internet Of Things, Pen Testing ...19Decks86Flashcards2Learners -
BIS BABE
BIS BABE
By: Selina Wong
1. Introduction, 2. Macro forces & information age, 3. Competitive advantage and strategy ...18Decks228Flashcards1Learner -
OU M362 SAQs
OU M362 SAQs
By: Ian Baker
Unit 5 Distributed systems: Software architecture and communication, Unit 6 The database tier: Handling transactions and concurrency, Unit 7 The business tier ...12Decks228Flashcards1Learner -
ICT
ICT
By: Tengku Humaira Tengku Naufal
WEEK 3: THE INTERNET AND THE WEB, WEEK 4: COMMUNICATIONS AND NETWORKS, WEEK 5: PRIVACY, SECURITY AND ETHICS3Decks64Flashcards1Learner -
OSFA_Specialist
OSFA_Specialist
By: Daniel Egan
Modes of inheritance, Types of variants, NGS chemistry ...29Decks269Flashcards1Learner -
Se
Se
By: Komal Kumari
se, web security, Hardware based software Protection3Decks17Flashcards2Learners -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture ...30Decks240Flashcards4Learners -
az-204 microsoft docs
az-204 microsoft docs
By: Unknown Unknown
Create serverless applications | Choose the best Azure service to automate your business processes, Create serverless applications | Create serverless logic with Azure Functions, Create serverless applications | Create a long-running serverless workflow with Durable Functions ...17Decks163Flashcards4Learners -
UCWD
UCWD
By: Sebastian Kampe
01 Web 2.0 + Social software, 02 Strategic Planning, 03 Interfaces and Technology ...8Decks73Flashcards1Learner -
ICT
ICT
By: Thobo Ferguson
ICT applications, Direct Input Devices, Web Authoring ...5Decks31Flashcards1Learner