GAZAR
Principal Engineer | Mentor | Educator
Log in
Register
Home
Mentorship
Podcast
Courses
Content
Learning
About
Home
Mentorship
Podcast
Courses
Content
Learning
Talk
Let's Talk
Home
/
Security
Security
5 items
Describe the difference between symmetric and asymmetric encryption, and when each is appropriate.
March 14, 2024
What is a Buffer Overflow vulnerability, and how can it be exploited?
March 14, 2024
Explain SQL Injection and how to prevent it in software applications.
March 14, 2024
What is Cross-Site Scripting (XSS), and how can it be prevented?
March 14, 2024
OWASP Top Ten for Software Developers
March 13, 2024