Unit 8
Wireless Access Methods
There are a variety of options at your disposal. Choose the method based on the use/purpose of t...
Web App Attacks
There are lots of them. In fact, here's a list of them. Privilege Escalation Pointer/object ...
Waterfall Development Life Cycle
The most widely used software development model. Waterfall requires each step to be fully comple...
Agile Software Development Model
A more agile approach to software development. Agile depicts software development as a never end...
Software Sandboxing
A security mechanism used in software development used to isolate running processes from each oth...
Static Code Analysis
The process of scrutinizing source code to identify potential problems and non-compliant coding p...
Secure Coding Techniques
We must protect our code from getting skidded! Thou shalt release an application that is globall...
Code Signing
Pay Microsoft and promise your code is safe and secure and totally isn't spyware or adware. Code...
Secure Cookies
Cookies are small pieces of data stored on a computer by a web browser while accessing a website....