GAZAR
Principal Engineer
|
Mentor
Hey, I'm Gazar. I teach developers and lead teams. Let's build your future.
Home
Videos
Blog
About
Resources
Let's Talk (Free)
Home
/
Security
Latest Security
View all
Describe the difference between symmetric and asymmetric encryption, and when each is appropriate.
What is a Buffer Overflow vulnerability, and how can it be exploited?
Explain SQL Injection and how to prevent it in software applications.
What is Cross-Site Scripting (XSS), and how can it be prevented?
OWASP Top Ten for Software Developers