der OnleiheVerbundHessen. OWASP Top 10: #1 Injection and #2 Broken Authentication

Seitenbereiche:

OWASP Top 10: #1 Injection and #2 Broken Authentication

OWASP Top 10: #1 Injection and #2 Broken Authentication

Auteur: Wong, Caroline

Année: 2018

Disponible

Contenu:
The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software security. The OWASP Top 10 list describes the ten biggest software vulnerabilities. In this course, application security expert Caroline Wong provides an overview of the top two: injection and broken authentication attacks. Find out how injection and broken authentication work and see real-life examples of the attacks and their impact on companies and consumers. Plus, get prevention techniques to avoid putting your applications and users at risk.

Titre: OWASP Top 10: #1 Injection and #2 Broken Authentication

Auteur: Wong, Caroline

Éditeur: LinkedIn

Catégorie: eLearning, Software & Programmieren, IT

13204 Exemplaires
13204 Disponible
0 Réservation

Durée du prêt: 180 jours