589689.xyz

Lynda - Techniques for Developing Secure Software

  • 收录时间:2018-03-04 01:18:43
  • 文件大小:167MB
  • 下载次数:85
  • 最近下载:2021-01-21 22:25:46
  • 磁力链接:

文件列表

  1. 020 Case study - Pattern-Oriented Architectural Analysis.mp4 6MB
  2. 032 Other secure coding best practices.mp4 6MB
  3. 027 Broken authentication and session management countermeasures.mp4 6MB
  4. 022 Software security anti-patterns.mp4 5MB
  5. 016 Security vulnerabilities.mp4 5MB
  6. 017 Architectural analysis for security.mp4 5MB
  7. 003 Significance of software security.mp4 5MB
  8. 025 Buffer overflow countermeasures.mp4 5MB
  9. 010 Architectural-level threats.mp4 5MB
  10. 009 Detailed design-level threats.mp4 5MB
  11. 024 Buffer overflow attacks.mp4 5MB
  12. 034 Static analysis.mp4 5MB
  13. 040 Vulnerability management.mp4 5MB
  14. 035 Exploring tools for static analysis.mp4 4MB
  15. 021 Case study - Vulnerability-Oriented Architectural Analysis.mp4 4MB
  16. 007 Hardware-level threats.mp4 4MB
  17. 013 Introduction to secure design.mp4 4MB
  18. 006 Software security resources.mp4 4MB
  19. 015 Security patterns.mp4 4MB
  20. 036 Dynamic analysis.mp4 4MB
  21. 031 Sensitive data exposure countermeasures.mp4 4MB
  22. 038 Penetration testing.mp4 4MB
  23. 008 Code-level threats.mp4 4MB
  24. 037 Exploring tools for dynamic analysis.mp4 4MB
  25. 011 Requirements-level threats.mp4 4MB
  26. 019 Case study - Tactic-Oriented Architectural Analysis.mp4 4MB
  27. 014 Security tactics.mp4 4MB
  28. 012 Threat modeling and tools.mp4 4MB
  29. 028 Insecure direct object references.mp4 4MB
  30. 005 Software security risk management.mp4 4MB
  31. 001 Welcome.mp4 3MB
  32. 023 Introduction to secure coding.mp4 3MB
  33. 033 Testing for security.mp4 3MB
  34. 026 Broken authentication and session management.mp4 3MB
  35. 030 Sensitive information exposure.mp4 3MB
  36. 004 Software security vocabulary.mp4 3MB
  37. 002 What is software security_.mp4 3MB
  38. 039 Exploring tools for penetration testing.mp4 2MB
  39. 029 Insecure direct object references countermeasures.mp4 2MB
  40. 042 Next steps.mp4 2MB
  41. 018 Case study - Setting the Stage.mp4 2MB
  42. 041 Exploring tools for vulnerabilty management.mp4 1MB