GAZAR

Principal Engineer | Mentor | Educator

Log inRegister
HomeMentorshipPodcastCourses
HomeMentorshipPodcastCourses
Talk
Let's Talk
  1. Home/
  2. Security

Security

5 items
Describe the difference between symmetric and asymmetric encryption, and when each is appropriate.
Describe the difference between symmetric and asymmetric encryption, and when each is appropriate.

March 14, 2024

What is a Buffer Overflow vulnerability, and how can it be exploited?
What is a Buffer Overflow vulnerability, and how can it be exploited?

March 14, 2024

Explain SQL Injection and how to prevent it in software applications.
Explain SQL Injection and how to prevent it in software applications.

March 14, 2024

What is Cross-Site Scripting (XSS), and how can it be prevented?
What is Cross-Site Scripting (XSS), and how can it be prevented?

March 14, 2024

OWASP Top Ten for Software Developers
OWASP Top Ten for Software Developers

March 13, 2024

Gazar

Engineering leadership with story and craft. Building teams and products that last.

gazar.dev is a brand and portfolio operated by QUEEK LIMITED.

Links

  • Contact
  • Privacy Policy
  • About
  • Mentorship

Resources

  • Courses
  • Blog
  • Talks
  • RSS Feed

Connect

me@gazar.dev

© 2026 QUEEK LIMITED. All rights reserved.