Download link
File List
-
020 Case study - Pattern-Oriented Architectural Analysis.mp4 5.97 MB
032 Other secure coding best practices.mp4 5.96 MB
027 Broken authentication and session management countermeasures.mp4 5.63 MB
022 Software security anti-patterns.mp4 5.21 MB
016 Security vulnerabilities.mp4 5.17 MB
017 Architectural analysis for security.mp4 5.1 MB
003 Significance of software security.mp4 4.99 MB
025 Buffer overflow countermeasures.mp4 4.91 MB
010 Architectural-level threats.mp4 4.82 MB
009 Detailed design-level threats.mp4 4.71 MB
024 Buffer overflow attacks.mp4 4.64 MB
034 Static analysis.mp4 4.58 MB
040 Vulnerability management.mp4 4.54 MB
035 Exploring tools for static analysis.mp4 4.5 MB
021 Case study - Vulnerability-Oriented Architectural Analysis.mp4 4.46 MB
007 Hardware-level threats.mp4 4.43 MB
013 Introduction to secure design.mp4 4.38 MB
006 Software security resources.mp4 4.33 MB
015 Security patterns.mp4 4.31 MB
036 Dynamic analysis.mp4 4.18 MB
031 Sensitive data exposure countermeasures.mp4 4.12 MB
038 Penetration testing.mp4 4.1 MB
008 Code-level threats.mp4 4.08 MB
037 Exploring tools for dynamic analysis.mp4 4.06 MB
011 Requirements-level threats.mp4 3.98 MB
019 Case study - Tactic-Oriented Architectural Analysis.mp4 3.97 MB
014 Security tactics.mp4 3.81 MB
012 Threat modeling and tools.mp4 3.81 MB
028 Insecure direct object references.mp4 3.8 MB
005 Software security risk management.mp4 3.65 MB
001 Welcome.mp4 3.4 MB
023 Introduction to secure coding.mp4 3.18 MB
033 Testing for security.mp4 3.11 MB
026 Broken authentication and session management.mp4 2.98 MB
030 Sensitive information exposure.mp4 2.96 MB
004 Software security vocabulary.mp4 2.89 MB
002 What is software security_.mp4 2.63 MB
039 Exploring tools for penetration testing.mp4 2.31 MB
029 Insecure direct object references countermeasures.mp4 2.18 MB
042 Next steps.mp4 2.17 MB
018 Case study - Setting the Stage.mp4 1.5 MB
041 Exploring tools for vulnerabilty management.mp4 1.34 MB
Download Info
-
Tips
“Lynda - Techniques for Developing Secure Software” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.