zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Lynda - Techniques for Developing Secure Software
magnet:?xt=urn:btih:29E2BB2AAEC6BB2F2A5F3D2748421DF00C9A0F9C&dn=Lynda - Techniques for Developing Secure Software
磁力链接详情
文件列表详情
29E2BB2AAEC6BB2F2A5F3D2748421DF00C9A0F9C
infohash:
42
文件数量
166.83 MB
文件大小
2016-1-26 11:34
创建日期
2024-11-11 01:00
最后访问
相关分词
Lynda
-
Techniques
for
Developing
Secure
Software
020 Case study - Pattern-Oriented Architectural Analysis.mp4 5.97 MB
032 Other secure coding best practices.mp4 5.96 MB
027 Broken authentication and session management countermeasures.mp4 5.63 MB
022 Software security anti-patterns.mp4 5.21 MB
016 Security vulnerabilities.mp4 5.17 MB
017 Architectural analysis for security.mp4 5.1 MB
003 Significance of software security.mp4 4.99 MB
025 Buffer overflow countermeasures.mp4 4.91 MB
010 Architectural-level threats.mp4 4.82 MB
009 Detailed design-level threats.mp4 4.71 MB
024 Buffer overflow attacks.mp4 4.64 MB
034 Static analysis.mp4 4.58 MB
040 Vulnerability management.mp4 4.54 MB
035 Exploring tools for static analysis.mp4 4.5 MB
021 Case study - Vulnerability-Oriented Architectural Analysis.mp4 4.46 MB
007 Hardware-level threats.mp4 4.43 MB
013 Introduction to secure design.mp4 4.38 MB
006 Software security resources.mp4 4.33 MB
015 Security patterns.mp4 4.31 MB
036 Dynamic analysis.mp4 4.18 MB
031 Sensitive data exposure countermeasures.mp4 4.12 MB
038 Penetration testing.mp4 4.1 MB
008 Code-level threats.mp4 4.08 MB
037 Exploring tools for dynamic analysis.mp4 4.06 MB
011 Requirements-level threats.mp4 3.98 MB
019 Case study - Tactic-Oriented Architectural Analysis.mp4 3.97 MB
014 Security tactics.mp4 3.81 MB
012 Threat modeling and tools.mp4 3.81 MB
028 Insecure direct object references.mp4 3.8 MB
005 Software security risk management.mp4 3.65 MB
001 Welcome.mp4 3.4 MB
023 Introduction to secure coding.mp4 3.18 MB
033 Testing for security.mp4 3.11 MB
026 Broken authentication and session management.mp4 2.98 MB
030 Sensitive information exposure.mp4 2.96 MB
004 Software security vocabulary.mp4 2.89 MB
002 What is software security_.mp4 2.63 MB
039 Exploring tools for penetration testing.mp4 2.31 MB
029 Insecure direct object references countermeasures.mp4 2.18 MB
042 Next steps.mp4 2.17 MB
018 Case study - Setting the Stage.mp4 1.5 MB
041 Exploring tools for vulnerabilty management.mp4 1.34 MB
其他位置