种子简介
种子名称:
Lynda - Techniques for Developing Secure Software
文件类型:
视频
文件数目:
42个文件
文件大小:
166.83 MB
收录时间:
2022-4-11 12:30
已经下载:
3次
资源热度:
241
最近下载:
2024-12-16 13:32
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:5ac4a67f2e225eaaef4accf3b636b6db348d8f97&dn=Lynda - Techniques for Developing Secure Software
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Lynda - Techniques for Developing Secure Software.torrent
01. Introduction/01_01-Welcome.mp43.4MB
02. Understanding Software Security/02_01-What is software security.mp42.63MB
02. Understanding Software Security/02_02-Significance of software security.mp44.99MB
02. Understanding Software Security/02_03-Software security vocabulary.mp42.89MB
02. Understanding Software Security/02_04-Software security risk management.mp43.65MB
02. Understanding Software Security/02_05-Software security resources.mp44.33MB
03. Software Security Threats/03_01-Hardwarelevel threats.mp44.43MB
03. Software Security Threats/03_02-Codelevel threats.mp44.08MB
03. Software Security Threats/03_03-Detailed designlevel threats.mp44.71MB
03. Software Security Threats/03_04-Architecturallevel threats.mp44.82MB
03. Software Security Threats/03_05-Requirementslevel threats.mp43.98MB
03. Software Security Threats/03_06-Threat modeling and tools.mp43.81MB
04. Secure Software Design/04_01-Introduction to secure design.mp44.38MB
04. Secure Software Design/04_02-Security tactics.mp43.81MB
04. Secure Software Design/04_03-Security patterns.mp44.31MB
04. Secure Software Design/04_04-Security vulnerabilities.mp45.17MB
04. Secure Software Design/04_05-Architectural analysis for security.mp45.1MB
04. Secure Software Design/04_06-Case study Setting the Stage.mp41.5MB
04. Secure Software Design/04_07-Case study TacticOriented Architectural Analysis.mp43.97MB
04. Secure Software Design/04_08-Case study PatternOriented Architectural Analysis.mp45.97MB
04. Secure Software Design/04_09-Case study VulnerabilityOriented Architectural Analysis.mp44.46MB
04. Secure Software Design/04_10-Software security antipatterns.mp45.21MB
05. Secure Coding/05_01-Introduction to secure coding.mp43.18MB
05. Secure Coding/05_02-Buffer overflow attacks.mp44.64MB
05. Secure Coding/05_03-Buffer overflow countermeasures.mp44.91MB
05. Secure Coding/05_04-Broken authentication and session management.mp42.98MB
05. Secure Coding/05_05-Broken authentication and session management countermeasures.mp45.63MB
05. Secure Coding/05_06-Insecure direct object references.mp43.8MB
05. Secure Coding/05_07-Insecure direct object references countermeasures.mp42.18MB
05. Secure Coding/05_08-Sensitive information exposure.mp42.96MB
05. Secure Coding/05_09-Sensitive data exposure countermeasures.mp44.12MB
05. Secure Coding/05_10-Other secure coding best practices.mp45.96MB
06. Testing for Security/06_01-Testing for security.mp43.11MB
06. Testing for Security/06_02-Static analysis.mp44.58MB
06. Testing for Security/06_03-Exploring tools for static analysis.mp44.5MB
06. Testing for Security/06_04-Dynamic analysis.mp44.18MB
06. Testing for Security/06_05-Exploring tools for dynamic analysis.mp44.06MB
06. Testing for Security/06_06-Penetration testing.mp44.1MB
06. Testing for Security/06_07-Exploring tools for penetration testing.mp42.31MB
06. Testing for Security/06_08-Vulnerability management.mp44.54MB
06. Testing for Security/06_09-Exploring tools for vulnerabilty management.mp41.34MB
07. Conclusion/07_01-Next steps.mp42.17MB