e-Ausleihe. All titles related to Wong, Caroline

Seitenbereiche:


Edit filter


Title 1-8 of 8


Wong, Caroline

Learning Security Metrics

In most areas of business, specifics matter. This is especially true in the area of cybersecurity. I ...

In stock since: 10.05.2021

Available

Wong, Caroline

Cybersecurity at Work

Cybersecurity isn't solely within your IT department's purview. If you own a smartphone, work on a c ...

In stock since: 10.05.2021

Available

Wong, Caroline

OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)

The Open Web Application Security Project (OWASP) was formed to provide the public with the resource ...

In stock since: 10.05.2021

Available

Wong, Caroline

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Security-related incidents pose major threats to organizations of all sizes, as well as the customer ...

In stock since: 10.05.2021

Available

Wong, Caroline

Learning the OWASP Top 10

It seems like there is a security-related incident in the news every day. What makes systems-and the ...

In stock since: 10.05.2021

Available

Wong, Caroline

OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

The Open Web Application Security Project (OWASP) was formed to provide the public with the resource ...

In stock since: 10.05.2021

Available

Wong, Caroline

OWASP Top 10: #7 XSS and #8 Insecure Deserialization

Recent changes in application architecture and technology have sparked new opportunities and ways of ...

In stock since: 10.05.2021

Available

Wong, Caroline

OWASP Top 10: #1 Injection and #2 Broken Authentication

The Open Web Application Security Project (OWASP) was formed to provide the public with the resource ...

In stock since: 10.05.2021

Available