Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Excessive Permissions: Mobile Apps Security
Graph Chatbot
Related lectures (32)
Previous
Page 1 of 4
Next
Protecting your data
Emphasizes the importance of data protection, covering threats, risks, prevention, and real-life examples of data loss incidents.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Gamification: Introduction and Techniques
Introduces the history and techniques of gamification in various contexts.
Mobile Platforms: Architecture & Development
Explores mobile platform architecture, app components, user experience design, inter-app communication, and push notifications.
IoT Commercial Product: Sensor Tag Technology
Explores the design and components of the Texas Instruments Sensor Tag IoT commercial product.
Smart Beard Trimmer: Shave Me!
Introduces a smart beard trimmer with an app for previewing and selecting beard styles, aiming to revolutionize the beard grooming market.
Asynchrony
Covers the purpose of services in the Android ecosystem, app permissions, Intents, designing mobile vs desktop apps, and handling synchronous and asynchronous operations.
Protecting Your Work and EPFL
Emphasizes protecting work and EPFL through laws, regulations, identifying threats, and securing hardware.
Mobile Platform Architecture
Explores mobile software development, app differences, user experience, and push notifications.
Adversarial Thinking: Defender - Threat Modelling
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.