O'Reilly - Introduction to Secure Software
- 收录时间:2018-02-25 23:49:13
- 文件大小:2GB
- 下载次数:67
- 最近下载:2021-01-10 14:01:28
- 磁力链接:
-
文件列表
- 02. Security Engineering/02_04-Security Protocols.mp4 110MB
- 07. Attacks/07_06-TLS Attacks BEAST, BREACH, CRIME.mp4 90MB
- 06. Web Security/06_01-Password Policies.mp4 86MB
- 06. Web Security/06_05-Feature OAuth.mp4 85MB
- 01. Introduction/01_02-Attacks in the News.mp4 59MB
- 04. Threat Modeling/04_04-Accounts.mp4 58MB
- 01. Introduction/01_07-Attacking Infrastructure.mp4 54MB
- 06. Web Security/06_08-Feature CORS.mp4 54MB
- 01. Introduction/01_04-Trusted vs Trustworthy.mp4 53MB
- 02. Security Engineering/02_02-Economics of Security.mp4 52MB
- 06. Web Security/06_04-Feature TLS.mp4 49MB
- 03. Software Security/03_01-Introduction to Software Security.mp4 48MB
- 02. Security Engineering/02_01-Introduction to Security Engineering.mp4 48MB
- 03. Software Security/03_11-Tools.mp4 47MB
- 08. The Future/08_02-Next Steps.mp4 44MB
- 03. Software Security/03_10-Principle Trust Judiciously.mp4 43MB
- 08. The Future/08_01-The Future.mp4 43MB
- 02. Security Engineering/02_03-Motivation.mp4 42MB
- 03. Software Security/03_08-Principle Least Privilege.mp4 42MB
- 04. Threat Modeling/04_03-Attack Trees.mp4 41MB
- 03. Software Security/03_04-Architectural Risk Assessment.mp4 41MB
- 01. Introduction/01_03-What We Tell Others.mp4 40MB
- 05. Security in the Organization/05_01-Introduction to Security in the Organization.mp4 37MB
- 04. Threat Modeling/04_05-Web and Cloud.mp4 36MB
- 06. Web Security/06_06-Feature HTTP Signatures.mp4 36MB
- 01. Introduction/01_08-Convincing Developers.mp4 35MB
- 03. Software Security/03_03-Security Testing.mp4 35MB
- 03. Software Security/03_07-Principle Fail Securely.mp4 33MB
- 05. Security in the Organization/05_02-Stakeholders.mp4 32MB
- 01. Introduction/01_05-Security Features.mp4 32MB
- 01. Introduction/01_09-Beyond Perimeter Defense.mp4 32MB
- 07. Attacks/07_03-XSS and HTML Injection.mp4 32MB
- 03. Software Security/03_09-Principle Log Securely.mp4 32MB
- 05. Security in the Organization/05_03-Teams Security Teams.mp4 32MB
- 05. Security in the Organization/05_06-Software Lifecycles.mp4 31MB
- 07. Attacks/07_02-Phishing.mp4 30MB
- 04. Threat Modeling/04_01-Introduction to Threat Modeling.mp4 27MB
- 06. Web Security/06_07-Feature JWT.mp4 27MB
- 06. Web Security/06_09-Feature CSP.mp4 27MB
- 07. Attacks/07_08-TLS Attacks POODLE.mp4 27MB
- 03. Software Security/03_05-Principle Protecting the Weakest Link.mp4 26MB
- 03. Software Security/03_06-Principle Defense in Depth.mp4 26MB
- 07. Attacks/07_04-CSRF.mp4 24MB
- 06. Web Security/06_02-Feature HTTP Basic.mp4 24MB
- 01. Introduction/01_06-Principle of Least Privilege.mp4 24MB
- 06. Web Security/06_10-Feature HSTS.mp4 24MB
- 06. Web Security/06_03-Feature HTTP Digest.mp4 23MB
- 03. Software Security/03_02-Risk Management.mp4 22MB
- 04. Threat Modeling/04_02-STRIDE.mp4 22MB
- 07. Attacks/07_05-SQL Injection.mp4 19MB
- 06. Web Security/06_11-Feature WAFs and Firewalls.mp4 19MB
- 05. Security in the Organization/05_05-Teams Operations.mp4 17MB
- 05. Security in the Organization/05_04-Teams Developers.mp4 14MB
- 07. Attacks/07_01-Attack Overview.mp4 5MB