Lynda - Techniques for Developing Secure Software
- 收录时间:2018-03-04 01:18:43
- 文件大小:167MB
- 下载次数:85
- 最近下载:2021-01-21 22:25:46
- 磁力链接:
-
文件列表
- 020 Case study - Pattern-Oriented Architectural Analysis.mp4 6MB
- 032 Other secure coding best practices.mp4 6MB
- 027 Broken authentication and session management countermeasures.mp4 6MB
- 022 Software security anti-patterns.mp4 5MB
- 016 Security vulnerabilities.mp4 5MB
- 017 Architectural analysis for security.mp4 5MB
- 003 Significance of software security.mp4 5MB
- 025 Buffer overflow countermeasures.mp4 5MB
- 010 Architectural-level threats.mp4 5MB
- 009 Detailed design-level threats.mp4 5MB
- 024 Buffer overflow attacks.mp4 5MB
- 034 Static analysis.mp4 5MB
- 040 Vulnerability management.mp4 5MB
- 035 Exploring tools for static analysis.mp4 4MB
- 021 Case study - Vulnerability-Oriented Architectural Analysis.mp4 4MB
- 007 Hardware-level threats.mp4 4MB
- 013 Introduction to secure design.mp4 4MB
- 006 Software security resources.mp4 4MB
- 015 Security patterns.mp4 4MB
- 036 Dynamic analysis.mp4 4MB
- 031 Sensitive data exposure countermeasures.mp4 4MB
- 038 Penetration testing.mp4 4MB
- 008 Code-level threats.mp4 4MB
- 037 Exploring tools for dynamic analysis.mp4 4MB
- 011 Requirements-level threats.mp4 4MB
- 019 Case study - Tactic-Oriented Architectural Analysis.mp4 4MB
- 014 Security tactics.mp4 4MB
- 012 Threat modeling and tools.mp4 4MB
- 028 Insecure direct object references.mp4 4MB
- 005 Software security risk management.mp4 4MB
- 001 Welcome.mp4 3MB
- 023 Introduction to secure coding.mp4 3MB
- 033 Testing for security.mp4 3MB
- 026 Broken authentication and session management.mp4 3MB
- 030 Sensitive information exposure.mp4 3MB
- 004 Software security vocabulary.mp4 3MB
- 002 What is software security_.mp4 3MB
- 039 Exploring tools for penetration testing.mp4 2MB
- 029 Insecure direct object references countermeasures.mp4 2MB
- 042 Next steps.mp4 2MB
- 018 Case study - Setting the Stage.mp4 2MB
- 041 Exploring tools for vulnerabilty management.mp4 1MB