Learn Web Security
Study Web Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
IGCSE Computer Science
IGCSE Computer Science
By: Coraline Jones
1 Understanding Algorithms, 2 Creating Algorithms, 3 Sorting and Searching Algorithms ...16Decks123Flashcards6Learners -
CODING
CODING
By: Justin Kinard
Design Patterns, Languages, Web development ...16Decks190Flashcards2Learners -
comp p1
comp p1
By: LIM YU XI NYJC 2023/2024
data representation, binary search algo, hash table ...25Decks169Flashcards1Learner -
Computer Science EDEXCEL IGSCE
Computer Science EDEXCEL IGSCE
By: Dinara Unknown
Programming : Unit 5-11, Problem Solving: Unit 1, Problem solving: Unit 2-3 ...22Decks415Flashcards1Learner -
IT theory
IT theory
By: a a
Gr10 1.1 - Thinking for Computers, Gr 10 2.1 Basic concepts of computing, Gr 10 2.2 Basic concepts of hardware ...40Decks448Flashcards6Learners -
IT Biztonság
IT Biztonság
By: Kinga Hegedüs
1. Intro - Control Questions, 2. Cryptography - Control Questions, 3. CryptoProtocols - Control Questions ...10Decks198Flashcards2Learners -
Computer Science
Computer Science
By: jayden le
Automated Systems, Databases, Robotics ...14Decks142Flashcards1Learner -
2. Management Information Systems
2. Management Information Systems
By: Stephanie Geary
Lesson 1: Informations Systems and You, Lesson 2: Business Processes and Decision Making, Lesson 3: Productivity, Innovation, and Strategy ...13Decks97Flashcards1Learner -
IoT BootCamp
IoT BootCamp
By: Zain Khaldoun
Session 1: Background, Session 2: IoT Programming Platform, Session 3: Communication Technologies ...6Decks41Flashcards4Learners -
Undeleted
Undeleted
By: Timothy Walter
1MY ACRONYMS, EMERGENCY PROCEDURES 1 - WATER RESCUE, 1MY ACRONYMS ...130Decks4,281Flashcards35Learners -
70-410
70-410
By: Itseore Aleogena
AD Command-line, AD Powershell, DHCP Cmdlets ...30Decks189Flashcards7Learners -
Cybersecurity
Cybersecurity
By: User Unknown
Gary 01 - Introduction, Gary 02 - Security modules, Gary 03 - Web Security3Decks40Flashcards2Learners -
AWS Certified Cloud Practitioner
AWS Certified Cloud Practitioner
By: Imani Adams
Module 1: Introduction to AWS Web Services, Module 2: Compute in the Cloud, Module 3: Global Infrastructure and Reliablity ...10Decks139Flashcards3Learners -
Exploring Network Technologies and Tools
Exploring Network Technologies and Tools
By: Alfredo Virula
Basic Networking Protocols, File Transfer Use Case, Email and Web Use Cases ...7Decks76Flashcards4Learners -
VEFF
VEFF
By: Sigurgeir Sigurðsson
Networking basics, HyperText Transfer Protocol (HTTP), Client-/Server-side AND the DOM ...11Decks150Flashcards1Learner -
Ethical Hacking
Ethical Hacking
By: phil bieni
Kahoot - Intro to Ethical hacking, Common Attack flows & Attack Terminology - EH-01-P1, Kahoot - EH-02-P1 Network Scanning ...12Decks115Flashcards4Learners -
JBorn Web
JBorn Web
By: Дмитрий Романюк
1. Основы реляционных баз данных. Язык запросов SQL, 2. Java Data Base Connectivity (JDBC), Maven, 3. DataSource, Application Layering ...12Decks96Flashcards9Learners -
Computing
Computing
By: Jack Leslie
Design & Theory of Programming - Design Notation, Design & Theory of Programming - Readability, Design & Theory of Programming - Handling Data ...38Decks259Flashcards5Learners -
Cambridge Tech IT Unit 2
Cambridge Tech IT Unit 2
By: Skye Drinkwater
1.1 Holders Of Information, 1.2 Types Of Information Storage Media, 1.3 Types Of Information Access And Storage Devices ...29Decks253Flashcards5Learners -
I.T Exam Unit 2
I.T Exam Unit 2
By: Connor Mason
Learning Outcomes:, LO1: World Wide Web Technologies, LO1: Storage Methods ...11Decks70Flashcards5Learners -
h2 computing
h2 computing
By: TAN WAN QI NYJC 2023/2024
Data Structures and Abstract Data Types, Object Oriented Programming, Recursion ...16Decks180Flashcards1Learner -
IS4560 HACKING AND COUNTERMEASURES
IS4560 HACKING AND COUNTERMEASURES
By: Barbara Crable
IS4560 CH 1 "Evolution of Hacking", IS4560 CH 2 TCP/IP Review, IS4560 CH 3 Cryptographic Concepts ...15Decks160Flashcards24Learners -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Christoph Todd
Common Terms, Zero Day Attack, Miscellaneous Computer Processes (stuff I find and look up along the way) ...66Decks320Flashcards7Learners -
ICT-Unit 2
ICT-Unit 2
By: Aaron Mensah
Holders of information, Types of information storage media, Types of information access and storage devices ...31Decks223Flashcards3Learners -
I.T
I.T
By: George Manuel
1. Wireless Technology, 2. ICT legislation, 3. Web technologies ...7Decks66Flashcards2Learners -
CompTIA PenTest+
CompTIA PenTest+
By: Grayden Odum
PenTest Methodologies, Rules of Engagement, White Box Support Resources ...30Decks195Flashcards8Learners -
UOFG_CYBER_SECURITY
UOFG_CYBER_SECURITY
By: michal wozniak
Lecture 1 - Introduction, Lecture 2 - Networks, Lecture 3 - Access Control Basics ...18Decks236Flashcards1Learner -
CSC2004: Cyber Security Fundamentals
CSC2004: Cyber Security Fundamentals
By: Jun Xian Lim
Summary: Lecture 13, Intro to Cryptography & Asymmetric Cryptography: Lecture 1, Access Control: Lecture 2 ...11Decks56Flashcards2Learners -
Linux
Linux
By: E Mi
Linux file system, Bash scripting, Cron jobs ...5Decks135Flashcards1Learner -
Server Side Scripting
Server Side Scripting
By: Aleysha Mullen
Regex, PHP, MySQL ...4Decks20Flashcards2Learners