Learn Secure Software Design
Study Secure Software Design using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISSP
CISSP
By: Dylan Jervis
Domain 1: Security and Risk Management, Domain 2: Asset Security, Domain 3: Security Architecture and Engineering - Cryptography ...12Decks398Flashcards1Learner -
iGCSE CS
iGCSE CS
By: C M
1.1 Binary Hex Number Systems + Text, 1.2 & 1.3 Text, Images, Sound, Memory Size, 1.3 & 2.2 Compression & Error Detection ...20Decks623Flashcards1Learner -
CISSP
CISSP
By: Mark Teasdale
Security Governance, Law, Regulation, Ethics, Data and Asset Security ...12Decks52Flashcards1Learner -
Computer Science A level
Computer Science A level
By: Nandor Vilmos
Chapter 16 Data representation, Chapter 17, Chapter 18 Boolean Algebra and Logic Circuits ...14Decks246Flashcards4Learners -
CGP Computer Science
CGP Computer Science
By: Aj Capewell
01 Section 1 - Computer Systems and the CPU, 01 - Section 1 - Memory and Computer performance, 01 - Section 1 - Secondary Storage ...24Decks763Flashcards39Learners -
CCSP
CCSP
By: Brian White
Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud Computing ...42Decks171Flashcards75Learners -
COMPUTER SCIENCE
COMPUTER SCIENCE
By: Ali Hamza
Chap#01 Principles of Computer Architecture & System Software, Chap#02 Information Networks, Chap#03 Data Communications ...12Decks221Flashcards1Learner -
C725 - Information Security and Assurance
C725 - Information Security and Assurance
By: S H
Chapter 2: Security Principles, Chapter 13: Software Development Security, Chapter 4: Governance and Risk Management ...11Decks254Flashcards2Learners -
Nat 5 Computing Science
Nat 5 Computing Science
By: Libby Entwhistle
WEB DESIGN AND DEVELOPMENT 1, file types/compression, WEB DESIGN AND DEVELOPMENT TEST 2 ...16Decks102Flashcards2Learners -
computer science topic checklist flash cards
computer science topic checklist flash cards
By: Jacob Heyes
1.1 Data structures, 1.2 Logical Operations, 1.3 Algorithms and Programs ...18Decks227Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Nathan O'Neal
Overview of Security, Malware, Malware Infections ...31Decks33Flashcards1Learner -
BH GCSE 2023-2025
BH GCSE 2023-2025
By: Kate Lynham
0 All Topics, 1.1.1 Architecture of the CPU, 1.1.2 Performance of the CPU ...26Decks504Flashcards11Learners -
CODING
CODING
By: Justin Kinard
Design Patterns, Languages, Web development ...16Decks190Flashcards2Learners -
IntroSec
IntroSec
By: Elsa N
SB 3: Security Basics, SB 4: A Language for Security, SB 5: Policy Languages and Policy Types ...21Decks188Flashcards1Learner -
2023 NOV exams
2023 NOV exams
By: Jessica Brown
SECTION C: DESIGN IN CONTEXT, SECTION B: DESIGN HISTORY, JAVA: Computer Hardware ...9Decks76Flashcards1Learner -
CISSP
CISSP
By: roland eschenburg
Software Development Security, Security Architecture And Design, Cryptography ...8Decks69Flashcards3Learners -
Computing
Computing
By: Daniel Barber
Topic 1.1 - Data Structures, Topic 1.2 - Logical Operations, 1.3 - Algorithms ...17Decks251Flashcards5Learners -
PRS
PRS
By: Lazar Kracunovic
IS IT Systems, Information Systems, Data and IS ...8Decks100Flashcards1Learner -
Harry's Computing Flashcards
Harry's Computing Flashcards
By: Thomas Scollay
Topic 1a : Structures and Links (Databases), Topic 1b: Structures and links (Websites), Topic 2: User Interface ...20Decks312Flashcards3Learners -
CompTIA Security Tests
CompTIA Security Tests
By: Hyun Rim
CH01 Overview of Security, CH02 Malware, CH03 Malware Infection ...56Decks2,102Flashcards1Learner -
Practice
Practice
By: Spirit Writer
(1)CyberSecurity Objectives, (1)Privacy Vs. Security, (1)Evaluating Security Risks ...89Decks906Flashcards1Learner -
Higher Computing
Higher Computing
By: A2 Tr
Software Design and Development, Computer Systems : Data Representation, Computer Systems : Computer Structure ...16Decks120Flashcards2Learners -
Computing
Computing
By: Jack Leslie
Design & Theory of Programming - Design Notation, Design & Theory of Programming - Readability, Design & Theory of Programming - Handling Data ...38Decks259Flashcards5Learners -
CISSP - 2021 Handerhan Notes
CISSP - 2021 Handerhan Notes
By: Ashley Joseph
Exam Notes, Information Security Governance & Risk Management, Asset Security ...10Decks44Flashcards2Learners -
Computer Science (Year 2)
Computer Science (Year 2)
By: Daniel Hole
Software Development, Computer Languages and Representations, Network and Computer Security ...4Decks99Flashcards1Learner -
Computing
Computing
By: Shannon Blyth
Computational Thinking, Algorithms And Programming, Defensive Design, 2.5 Programming Languages and IDEs ...5Decks138Flashcards1Learner -
Computer Science
Computer Science
By: Henry Green
Defensive Design, CPU, Memory ...45Decks200Flashcards1Learner -
Computer Science
Computer Science
By: Proud Mutata
Chapter 1. Information Representation, Chapter 2. Communication, Chapter 3. Hardware ...15Decks37Flashcards1Learner -
ICT A Level
ICT A Level
By: Darren Nott
1b Investigation methods, 1c Prototyping & RAD *, 1d Testing & Test Plans * ...54Decks164Flashcards8Learners -
CompTIA Security+ Certification Exam
CompTIA Security+ Certification Exam
By: Fareedah James
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks., 1.3 Explain threat actor types and attributes. ...37Decks130Flashcards1Learner