Secure applications
21 setembro 2015, 12:00 • Miguel Filipe Leitão Pardal
C vulnerabilities.
Security architecture: policies, procedures, standards and mechanisms.
Risk analysis overview.
Certification of applications and systems: TCSEC, ITSEC, Common Criteria.