589689.xyz

[] Coursera - Secure Software Design Specialization

  • 收录时间:2023-07-06 19:46:42
  • 文件大小:2GB
  • 下载次数:1
  • 最近下载:2023-07-06 19:46:42
  • 磁力链接:

文件列表

  1. software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.mp4 125MB
  2. software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.mp4 100MB
  3. software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.mp4 98MB
  4. software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.mp4 93MB
  5. software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.mp4 86MB
  6. software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.mp4 69MB
  7. software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.mp4 68MB
  8. software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.mp4 68MB
  9. software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.mp4 68MB
  10. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.mp4 67MB
  11. software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.mp4 63MB
  12. software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.mp4 61MB
  13. software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.mp4 60MB
  14. software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.mp4 57MB
  15. software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.mp4 56MB
  16. software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.mp4 56MB
  17. software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.mp4 55MB
  18. software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.mp4 48MB
  19. software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.mp4 48MB
  20. software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.mp4 47MB
  21. software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.mp4 44MB
  22. software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.mp4 44MB
  23. software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.mp4 44MB
  24. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.mp4 43MB
  25. software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.mp4 42MB
  26. software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.mp4 42MB
  27. software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.mp4 40MB
  28. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.mp4 40MB
  29. software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.mp4 38MB
  30. software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.mp4 38MB
  31. software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.mp4 35MB
  32. software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.mp4 33MB
  33. software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.mp4 30MB
  34. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.mp4 29MB
  35. software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.mp4 27MB
  36. software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.mp4 25MB
  37. software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.mp4 23MB
  38. software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.mp4 21MB
  39. software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.mp4 20MB
  40. software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.mp4 20MB
  41. software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.mp4 20MB
  42. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.mp4 18MB
  43. software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.mp4 17MB
  44. software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.mp4 16MB
  45. software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.mp4 14MB
  46. software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.mp4 10MB
  47. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.mp4 5MB
  48. software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/02_additional-resource_ourusoff--introduction_to_jackson_design_method.pdf 972KB
  49. software-design-methods-tools/05_ethics/02_project-ethics-ii/02_additional-resource_12-ethical-dilemmas-gnawing-at-developers-today.html 167KB
  50. software-design-methods-tools/04_unit-testing/02_using-junit/02_additional-resource_junit_quick_guide.htm 117KB
  51. software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/02_additional-resource_C9.pdf 56KB
  52. software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/02_additional-resource_bb727010.aspx 48KB
  53. software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_index.html 44KB
  54. software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/02_additional-resource_rhp_c_dm_designing_seq_dgrms.html 43KB
  55. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/02_additional-resource_sdlc_overview.htm 34KB
  56. software-design-abstraction/04_advanced-database-design/01_database-design-ii/02_additional-resource_second-normal-form.htm 34KB
  57. software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.en.srt 22KB
  58. software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.en.srt 21KB
  59. software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_DataConsiten_Norm3NF.html 21KB
  60. software-design-methods-tools/04_unit-testing/01_junit-install/02_testrunner-download_TestRunner.zip 20KB
  61. software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.en.srt 18KB
  62. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.en.srt 18KB
  63. software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.en.srt 17KB
  64. software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.en.srt 17KB
  65. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/02_additional-resource_korthof78.htm 16KB
  66. software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.en.srt 14KB
  67. software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.en.srt 14KB
  68. software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.en.txt 13KB
  69. software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.en.txt 13KB
  70. software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.en.srt 13KB
  71. software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.en.srt 13KB
  72. software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.en.srt 12KB
  73. software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.en.srt 11KB
  74. software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.en.srt 11KB
  75. software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.en.srt 11KB
  76. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.en.txt 11KB
  77. software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.en.srt 11KB
  78. software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.en.srt 11KB
  79. software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.en.txt 11KB
  80. software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.en.srt 11KB
  81. software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.en.txt 11KB
  82. software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.en.txt 11KB
  83. software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.en.srt 11KB
  84. software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.en.srt 11KB
  85. software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.en.srt 11KB
  86. software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.en.srt 10KB
  87. software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.en.srt 10KB
  88. software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.en.srt 10KB
  89. software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.en.srt 10KB
  90. software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.en.srt 9KB
  91. software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.en.txt 9KB
  92. software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.en.srt 9KB
  93. software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.en.srt 9KB
  94. software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/02_how-high-level-design-or-architecture-handles-security-problems_quiz.html 8KB
  95. software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.en.txt 8KB
  96. software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.en.srt 8KB
  97. software-design-development-life-cycle/05_final-exam/01_final-exam/05_assessment-5_exam.html 8KB
  98. software-design-development-life-cycle/05_final-exam/01_final-exam/03_assessment-3_exam.html 8KB
  99. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.en.srt 8KB
  100. software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.en.txt 8KB
  101. software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/03_introduction-to-secure-software-design_quiz.html 8KB
  102. software-design-development-life-cycle/05_final-exam/01_final-exam/01_assessment-1_exam.html 8KB
  103. software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.en.srt 8KB
  104. software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.en.txt 8KB
  105. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/03_how-design-fits_quiz.html 8KB
  106. software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.en.srt 8KB
  107. software-design-development-life-cycle/05_final-exam/01_final-exam/04_assessment-4_exam.html 8KB
  108. software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/03_design-in-the-context-of-different-sdlc-s_quiz.html 8KB
  109. software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.en.srt 8KB
  110. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.en.srt 8KB
  111. software-design-development-life-cycle/05_final-exam/01_final-exam/02_assessment-2_exam.html 7KB
  112. software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.en.txt 7KB
  113. software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.en.srt 7KB
  114. software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.en.txt 7KB
  115. software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.en.txt 7KB
  116. software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/02_additional-resource_abstraction.html 7KB
  117. software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.en.srt 7KB
  118. software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.en.txt 7KB
  119. software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.en.txt 7KB
  120. software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.en.txt 7KB
  121. software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.en.txt 7KB
  122. software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.en.srt 7KB
  123. software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.en.txt 7KB
  124. software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.en.txt 7KB
  125. software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.en.txt 6KB
  126. software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.en.txt 6KB
  127. software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.en.txt 6KB
  128. software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.en.txt 6KB
  129. software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.en.srt 6KB
  130. software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.en.txt 6KB
  131. software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.en.srt 6KB
  132. software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.en.srt 6KB
  133. software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.en.txt 6KB
  134. software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.en.srt 6KB
  135. software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.en.txt 5KB
  136. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.en.srt 5KB
  137. software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.en.txt 5KB
  138. software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.en.txt 5KB
  139. software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/02_additional-resource_what-is-z.html 5KB
  140. software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.en.srt 5KB
  141. software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.en.srt 5KB
  142. software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.en.txt 5KB
  143. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.en.txt 5KB
  144. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.en.srt 5KB
  145. software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.en.txt 5KB
  146. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.en.txt 5KB
  147. software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.en.txt 5KB
  148. software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.en.txt 4KB
  149. software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.en.srt 4KB
  150. software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.en.txt 4KB
  151. software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.en.txt 4KB
  152. software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.en.txt 4KB
  153. software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.en.txt 4KB
  154. software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.en.txt 4KB
  155. software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.en.srt 4KB
  156. software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.en.txt 4KB
  157. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.en.txt 3KB
  158. software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.en.txt 3KB
  159. software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.en.txt 3KB
  160. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.en.txt 3KB
  161. software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.en.txt 3KB
  162. software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.en.txt 2KB
  163. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.en.srt 2KB
  164. software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_instructions.html 1KB
  165. software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/02_additional-resource_instructions.html 1KB
  166. software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/02_additional-resource_instructions.html 1KB
  167. software-design-abstraction/04_advanced-database-design/01_database-design-ii/02_additional-resource_instructions.html 1KB
  168. software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/02_additional-resource_instructions.html 1KB
  169. software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/02_additional-resource_instructions.html 1KB
  170. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/02_additional-resource_instructions.html 1KB
  171. software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/02_additional-resource_instructions.html 1KB
  172. software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/02_additional-resource_instructions.html 1KB
  173. software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/02_additional-resource_instructions.html 1KB
  174. software-design-methods-tools/05_ethics/02_project-ethics-ii/02_additional-resource_instructions.html 1KB
  175. software-design-abstraction/03_what-if-there-are-no-users/02_database-design/02_additional-resource_instructions.html 1KB
  176. software-design-methods-tools/05_ethics/01_ethics-i/02_additional-resource_instructions.html 1KB
  177. software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/02_additional-resource_instructions.html 1KB
  178. software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/02_additional-resource_instructions.html 1KB
  179. software-design-abstraction/02_focus-on-the-users/02_user-experience/02_additional-resource_instructions.html 1KB
  180. software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/02_additional-resource_instructions.html 1KB
  181. software-design-abstraction/06_language-choices/02_operating-system-selection/02_additional-resource_instructions.html 1KB
  182. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/02_additional-resource_instructions.html 1KB
  183. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.en.txt 1KB
  184. software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/02_additional-resource_instructions.html 1KB
  185. software-design-abstraction/02_focus-on-the-users/01_user-interface-design/02_additional-resource_instructions.html 1KB
  186. software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/02_additional-resource_instructions.html 1KB
  187. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/02_additional-resource_instructions.html 1KB
  188. software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/02_additional-resource_instructions.html 1KB
  189. software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/02_additional-resource_instructions.html 1KB
  190. software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/02_additional-resource_instructions.html 1KB
  191. software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/02_additional-resource_instructions.html 1KB
  192. software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/02_additional-resource_instructions.html 1KB
  193. software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/02_additional-resource_instructions.html 1KB
  194. software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/02_additional-reading_instructions.html 1KB
  195. software-design-methods-tools/04_unit-testing/02_using-junit/02_additional-resource_instructions.html 1KB
  196. software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/02_additional-resource_instructions.html 1KB
  197. software-design-abstraction/06_language-choices/01_languages-and-operating-systems/02_additional-resource_instructions.html 1KB
  198. software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/02_additional-resource_instructions.html 1KB
  199. software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/02_additional-resource_instructions.html 1KB
  200. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/02_additional-resource_instructions.html 1KB
  201. software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/02_additional-resource_instructions.html 1KB
  202. software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/02_additional-resource_instructions.html 1KB
  203. software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/02_additional-resource_instructions.html 1KB
  204. software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/02_additional-resource_instructions.html 1KB
  205. software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/02_additional-resource_instructions.html 1KB
  206. software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/02_additional-resource_instructions.html 1KB
  207. software-design-methods-tools/04_unit-testing/01_junit-install/02_testrunner-download_instructions.html 1KB
  208. software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/02_additional-resource_e_dta-sw-design-high-level.php 783B
  209. 0. Websites you may like/[CourserHub.com].url 123B
  210. Readme.txt 51B