zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Lynda - Techniques for Developing Secure Software
magnet:?xt=urn:btih:5ac4a67f2e225eaaef4accf3b636b6db348d8f97&dn=Lynda - Techniques for Developing Secure Software
磁力链接详情
文件列表详情
5ac4a67f2e225eaaef4accf3b636b6db348d8f97
infohash:
42
文件数量
166.83 MB
文件大小
2022-4-11 12:30
创建日期
2025-1-14 12:56
最后访问
相关分词
Lynda
-
Techniques
for
Developing
Secure
Software
01. Introduction/01_01-Welcome.mp4 3.4 MB
02. Understanding Software Security/02_01-What is software security.mp4 2.63 MB
02. Understanding Software Security/02_02-Significance of software security.mp4 4.99 MB
02. Understanding Software Security/02_03-Software security vocabulary.mp4 2.89 MB
02. Understanding Software Security/02_04-Software security risk management.mp4 3.65 MB
02. Understanding Software Security/02_05-Software security resources.mp4 4.33 MB
03. Software Security Threats/03_01-Hardwarelevel threats.mp4 4.43 MB
03. Software Security Threats/03_02-Codelevel threats.mp4 4.08 MB
03. Software Security Threats/03_03-Detailed designlevel threats.mp4 4.71 MB
03. Software Security Threats/03_04-Architecturallevel threats.mp4 4.82 MB
03. Software Security Threats/03_05-Requirementslevel threats.mp4 3.98 MB
03. Software Security Threats/03_06-Threat modeling and tools.mp4 3.81 MB
04. Secure Software Design/04_01-Introduction to secure design.mp4 4.38 MB
04. Secure Software Design/04_02-Security tactics.mp4 3.81 MB
04. Secure Software Design/04_03-Security patterns.mp4 4.31 MB
04. Secure Software Design/04_04-Security vulnerabilities.mp4 5.17 MB
04. Secure Software Design/04_05-Architectural analysis for security.mp4 5.1 MB
04. Secure Software Design/04_06-Case study Setting the Stage.mp4 1.5 MB
04. Secure Software Design/04_07-Case study TacticOriented Architectural Analysis.mp4 3.97 MB
04. Secure Software Design/04_08-Case study PatternOriented Architectural Analysis.mp4 5.97 MB
04. Secure Software Design/04_09-Case study VulnerabilityOriented Architectural Analysis.mp4 4.46 MB
04. Secure Software Design/04_10-Software security antipatterns.mp4 5.21 MB
05. Secure Coding/05_01-Introduction to secure coding.mp4 3.18 MB
05. Secure Coding/05_02-Buffer overflow attacks.mp4 4.64 MB
05. Secure Coding/05_03-Buffer overflow countermeasures.mp4 4.91 MB
05. Secure Coding/05_04-Broken authentication and session management.mp4 2.98 MB
05. Secure Coding/05_05-Broken authentication and session management countermeasures.mp4 5.63 MB
05. Secure Coding/05_06-Insecure direct object references.mp4 3.8 MB
05. Secure Coding/05_07-Insecure direct object references countermeasures.mp4 2.18 MB
05. Secure Coding/05_08-Sensitive information exposure.mp4 2.96 MB
05. Secure Coding/05_09-Sensitive data exposure countermeasures.mp4 4.12 MB
05. Secure Coding/05_10-Other secure coding best practices.mp4 5.96 MB
06. Testing for Security/06_01-Testing for security.mp4 3.11 MB
06. Testing for Security/06_02-Static analysis.mp4 4.58 MB
06. Testing for Security/06_03-Exploring tools for static analysis.mp4 4.5 MB
06. Testing for Security/06_04-Dynamic analysis.mp4 4.18 MB
06. Testing for Security/06_05-Exploring tools for dynamic analysis.mp4 4.06 MB
06. Testing for Security/06_06-Penetration testing.mp4 4.1 MB
06. Testing for Security/06_07-Exploring tools for penetration testing.mp4 2.31 MB
06. Testing for Security/06_08-Vulnerability management.mp4 4.54 MB
06. Testing for Security/06_09-Exploring tools for vulnerabilty management.mp4 1.34 MB
07. Conclusion/07_01-Next steps.mp4 2.17 MB
其他位置