Learn Web Security
Study Web Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Computer Science
Computer Science
By: Neel Saraf
Chapter 1 (1.1, 1.2, 1.3) Data representation, Chapter 2 (2.1, 2.2, 2.3) Data Transmission, Chapter 3.1 (A) CPU, Architecture, Cache/Cores ...28Decks837Flashcards10Learners -
ag-CEH-V10 - Certified Ethical Hacker
ag-CEH-V10 - Certified Ethical Hacker
By: Anti Gondu
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals ...25Decks922Flashcards2Learners -
Programming
Programming
By: Albert van der Merwe
Important Javascript facts, Application Accessibility Concepts, Programming patterns and techniques ...23Decks404Flashcards1Learner -
05 - Computer Security
05 - Computer Security
By: Gabriel Miki
x86 - Theory, Buffer Overflow - Theory, Format String Theory ...10Decks237Flashcards1Learner -
Unit 2 IT - + Questions
Unit 2 IT - + Questions
By: Tasmiyah AMIR
1.1 HOLDERS OF INFORMATION, 1.2 - Types of Information Storage Media, 1.3 - Types of INFO ACCESS + STORAGE DEVICES. ...35Decks410Flashcards4Learners -
CMPUT 404
CMPUT 404
By: Alex Nguyen
Menti Review Questions, The Web and the Internet, HTTP ...13Decks282Flashcards1Learner -
COMPUTING
COMPUTING
By: TRAN HUY THAI NYJC 2023/2024
Network Security, Networking - General, OOP ...17Decks152Flashcards1Learner -
Nat 5 Computing
Nat 5 Computing
By: Talia Brady
Databases, Databases, Navigation ...14Decks93Flashcards14Learners -
COSC 417 - Topics in Computer Networks
COSC 417 - Topics in Computer Networks
By: Ally Thomas
Lecture 1: Autonomous Systems, Lecture 2: Intro to BGP, Lecture 3: BGP Breakdown ...18Decks266Flashcards2Learners -
Computer science - Security and ethics
Computer science - Security and ethics
By: Bosun Gonza
Computer ethics, Security issues, SSL and TLS protocols ...7Decks58Flashcards2Learners -
A+ Core 2, 220-1102
A+ Core 2, 220-1102
By: Rushby Craig
Boot and Installation Methods, Mobile Operating Systems, Windows OS ...39Decks385Flashcards2Learners -
Javascript Interview questions
Javascript Interview questions
By: se7en coding
JavaScript Fundamentals, Asynchronous JavaScript, JavaScript Internals & Advanced Concepts ...10Decks493Flashcards1Learner -
Software Development
Software Development
By: Hamid Shoja
NextJs, Software Engineering, Frontend development tips ...18Decks148Flashcards2Learners -
JAVA Basics
JAVA Basics
By: damiane navrozashvili
Chapter 1 - Introduction, Chapter 18 - Java Virtual Machine, Chapter 19 - Garbage Collector ...26Decks696Flashcards11Learners -
Z/ HIGHER Computing Science
Z/ HIGHER Computing Science
By: Jill Beard
"SDD", "ISDD", SDD Notes lol N5 ...27Decks1,061Flashcards82Learners -
AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate
By: Jill Kay
Basics (from the Certified Cloud Practicioner course), Fundamentals, IAM ...22Decks340Flashcards1Learner -
Higher Computing (ISDD)
Higher Computing (ISDD)
By: Luke Carrigan
Relational Database Design, Implementation And Use, User Interfaces And Types Of User, Compressing Media Types ...17Decks409Flashcards14Learners -
Web Applications and Architectures
Web Applications and Architectures
By: Karanpal Sekhon
Part 1 - Internet and HTTP, Part 2 - HTML, JS, and Ajax, Part 3 - Websockets, REST, Auth, and Security ...4Decks312Flashcards1Learner -
Computer Security
Computer Security
By: Zelia Mauro
Threat Modeling + Security Mindset, OS, CPU, Memory, Buffer Overflow... oh my!, All things crypto ...9Decks248Flashcards5Learners -
computer science
computer science
By: bushra akhtar
1.2 Text, sound and images, 1.3 Data storage and compression, 9 Databases ...11Decks223Flashcards1Learner -
Chapter 6
Chapter 6
By: Jacob PRANTALOS
Physical and software security controls, Software acquired from third parties, Software development practices ...7Decks27Flashcards1Learner -
Comptia IFT+
Comptia IFT+
By: Rhett Newman
2.5 compare and contrast storage types, 2.6 Compare and Contrast common computing devices and their purposes, 2.7 explain basic networking concepts ...22Decks306Flashcards33Learners -
CIS 111_Study for Quiz/Test
CIS 111_Study for Quiz/Test
By: Phuoc Tran
Chapter 1: Information Technology, The Internet and you, Chapter 2: The Internet, The Web, and Electronic Commerce, Chapter 3: Basic Application Software ...9Decks566Flashcards7Learners -
Security Engineering
Security Engineering
By: Adina G
Introduction to Security, Symmetry Key Encryption, AES, Public Key Encryption ...10Decks219Flashcards2Learners -
IAS - Midterms
IAS - Midterms
By: John Paul Birol
Security Objectives, OSI Security Architecture, Passive Attack ...11Decks58Flashcards1Learner -
exam prep
exam prep
By: Lujain Almulaifi
The Psychoanalytic Perspective, The Psychosocial Theories, The Learning Perspective ...9Decks139Flashcards1Learner -
Coding exam
Coding exam
By: Melissa Pearson
Coding definitions, CMS quiz answers, Web dev quiz answers ...7Decks141Flashcards2Learners -
infocomm security
infocomm security
By: siti syarafana
topic 4A : networks and security, topic 4B : networks and security, topic 5A: Server security ...8Decks121Flashcards1Learner -
Dasak
Dasak
By: Jussi Kangas
Tentafrågor, Egna frågor 1 (koncept), Egna frågor 2 (tekniska termer) ...4Decks156Flashcards4Learners -
INS
INS
By: Abdullahi Mohamed
Week 1 Network layer, Week 2 Transport layer, Week 7 - Travelling salesman problem ...11Decks225Flashcards1Learner