Buffer Overflow

Loading...
From the course by University of Colorado System
Software Design Threats and Mitigations
3 оценки
University of Colorado System
3 оценки
Course 4 of 4 in the Specialization Secure Software Design
From the lesson
Simple software compromises
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!

Meet the Instructors

  • Albert Glock
    Albert Glock
    Instructor
    Computer Science

Ознакомьтесь с нашим каталогом

Присоединяйтесь бесплатно и получайте персонализированные рекомендации, обновления и предложения.