Terms you'll need to understand:
Tuple
Polyinstantiation
Inference
Certification
Accreditation
Database
Malware
Buffer overflow
Techniques you'll need to master:
Identifying the system development life cycle
Understanding database design
Stating the steps of the development life cycle
Recognizing the different types of failure states
Recognizing the four primary types of databases
Well-written applications are the key to good security. As such, this chapter focuses on the security requirements that are needed when developing applications. Although this chapter won't make you into a programmer, it will help you understand the steps required to build robust and secure applications.
To become certified ...
No credit card required