diff options
-rw-r--r-- | synopsis.pdf | bin | 79211 -> 80690 bytes | |||
-rw-r--r-- | synopsis.tex | 8 |
2 files changed, 7 insertions, 1 deletions
diff --git a/synopsis.pdf b/synopsis.pdf Binary files differindex 84b3a76..8ef3e5a 100644 --- a/synopsis.pdf +++ b/synopsis.pdf diff --git a/synopsis.tex b/synopsis.tex index 080023f..0b50d5a 100644 --- a/synopsis.tex +++ b/synopsis.tex @@ -37,7 +37,13 @@ In order to give an answer to it, I will first need to find solutions to the fol \end{itemize} \section{Method} - +The method which I am going to use in my research consists of a few activities: +\begin{itemize} + \item Getting general information about application security using all of the sources available on the internet, this could include reading articles, watching videos, talks, lectures and and online courses + \item Reading books related to the subject of application security + \item Finding detailed descriptions and tutorials about specific attack techniques + \item Trying to reproduce the attacks by creating vulnerable applications and exploiting them +\end{itemize} \section{Plan} \section{Work} |