本站已收录 番号和无损神作磁力链接/BT种子 

Lynda - Techniques for Developing Secure Software

种子简介

种子名称: Lynda - Techniques for Developing Secure Software
文件类型: 视频
文件数目: 42个文件
文件大小: 166.83 MB
收录时间: 2022-4-11 12:30
已经下载: 3
资源热度: 170
最近下载: 2024-6-1 23:59

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:5ac4a67f2e225eaaef4accf3b636b6db348d8f97&dn=Lynda - Techniques for Developing Secure Software 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Lynda - Techniques for Developing Secure Software.torrent
  • 01. Introduction/01_01-Welcome.mp43.4MB
  • 02. Understanding Software Security/02_01-What is software security.mp42.63MB
  • 02. Understanding Software Security/02_02-Significance of software security.mp44.99MB
  • 02. Understanding Software Security/02_03-Software security vocabulary.mp42.89MB
  • 02. Understanding Software Security/02_04-Software security risk management.mp43.65MB
  • 02. Understanding Software Security/02_05-Software security resources.mp44.33MB
  • 03. Software Security Threats/03_01-Hardwarelevel threats.mp44.43MB
  • 03. Software Security Threats/03_02-Codelevel threats.mp44.08MB
  • 03. Software Security Threats/03_03-Detailed designlevel threats.mp44.71MB
  • 03. Software Security Threats/03_04-Architecturallevel threats.mp44.82MB
  • 03. Software Security Threats/03_05-Requirementslevel threats.mp43.98MB
  • 03. Software Security Threats/03_06-Threat modeling and tools.mp43.81MB
  • 04. Secure Software Design/04_01-Introduction to secure design.mp44.38MB
  • 04. Secure Software Design/04_02-Security tactics.mp43.81MB
  • 04. Secure Software Design/04_03-Security patterns.mp44.31MB
  • 04. Secure Software Design/04_04-Security vulnerabilities.mp45.17MB
  • 04. Secure Software Design/04_05-Architectural analysis for security.mp45.1MB
  • 04. Secure Software Design/04_06-Case study Setting the Stage.mp41.5MB
  • 04. Secure Software Design/04_07-Case study TacticOriented Architectural Analysis.mp43.97MB
  • 04. Secure Software Design/04_08-Case study PatternOriented Architectural Analysis.mp45.97MB
  • 04. Secure Software Design/04_09-Case study VulnerabilityOriented Architectural Analysis.mp44.46MB
  • 04. Secure Software Design/04_10-Software security antipatterns.mp45.21MB
  • 05. Secure Coding/05_01-Introduction to secure coding.mp43.18MB
  • 05. Secure Coding/05_02-Buffer overflow attacks.mp44.64MB
  • 05. Secure Coding/05_03-Buffer overflow countermeasures.mp44.91MB
  • 05. Secure Coding/05_04-Broken authentication and session management.mp42.98MB
  • 05. Secure Coding/05_05-Broken authentication and session management countermeasures.mp45.63MB
  • 05. Secure Coding/05_06-Insecure direct object references.mp43.8MB
  • 05. Secure Coding/05_07-Insecure direct object references countermeasures.mp42.18MB
  • 05. Secure Coding/05_08-Sensitive information exposure.mp42.96MB
  • 05. Secure Coding/05_09-Sensitive data exposure countermeasures.mp44.12MB
  • 05. Secure Coding/05_10-Other secure coding best practices.mp45.96MB
  • 06. Testing for Security/06_01-Testing for security.mp43.11MB
  • 06. Testing for Security/06_02-Static analysis.mp44.58MB
  • 06. Testing for Security/06_03-Exploring tools for static analysis.mp44.5MB
  • 06. Testing for Security/06_04-Dynamic analysis.mp44.18MB
  • 06. Testing for Security/06_05-Exploring tools for dynamic analysis.mp44.06MB
  • 06. Testing for Security/06_06-Penetration testing.mp44.1MB
  • 06. Testing for Security/06_07-Exploring tools for penetration testing.mp42.31MB
  • 06. Testing for Security/06_08-Vulnerability management.mp44.54MB
  • 06. Testing for Security/06_09-Exploring tools for vulnerabilty management.mp41.34MB
  • 07. Conclusion/07_01-Next steps.mp42.17MB