diff options
author | marcinzelent <zelent.marcin@gmail.com> | 2018-05-11 16:58:50 +0200 |
---|---|---|
committer | marcinzelent <zelent.marcin@gmail.com> | 2018-05-11 16:58:50 +0200 |
commit | ca2af5e70b1f8530a48a5c7ae22e2dedebc92e2f (patch) | |
tree | 69579eba90b539b41b7af21d0ec9db17ee5c0590 /synopsis.tex | |
parent | 0a2fca6be2655ee9f5abd4d3f970c7a288b3c4fc (diff) |
Added method
Diffstat (limited to 'synopsis.tex')
-rw-r--r-- | synopsis.tex | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/synopsis.tex b/synopsis.tex index 080023f..0b50d5a 100644 --- a/synopsis.tex +++ b/synopsis.tex @@ -37,7 +37,13 @@ In order to give an answer to it, I will first need to find solutions to the fol \end{itemize} \section{Method} - +The method which I am going to use in my research consists of a few activities: +\begin{itemize} + \item Getting general information about application security using all of the sources available on the internet, this could include reading articles, watching videos, talks, lectures and and online courses + \item Reading books related to the subject of application security + \item Finding detailed descriptions and tutorials about specific attack techniques + \item Trying to reproduce the attacks by creating vulnerable applications and exploiting them +\end{itemize} \section{Plan} \section{Work} |