IEEE Computer Society Store Catalog
Please log in
- By Type
- By Topic
Modules include infrastructure basics - hacking Unix, databases, and applications - hacking windows - information gathering, profiling, and cross-site scripting - injection, flaws, files, and hacks.
This course provides a broad overview of various software security threats and some of the most effective countermeasures used to thwart both well-known and newly emerging software security threats.
The fast productization of IoT technologies is leaving users vulnerable to security and privacy risks.
Led by moderator Joshua Greenbaum, Principal, Enterprise Applications Consulting, this panel explores what's good and what's not so good for individuals, end-user organizations and their software and service providers as privacy, mobility, and the cl...