Secure applications

21 Setembro 2015, 12:00 Miguel Filipe Leitão Pardal

C vulnerabilities.

Security architecture: policies, procedures, standards and mechanisms.

Risk analysis overview.

Certification of applications and systems: TCSEC, ITSEC, Common Criteria.