种子简介
种子名称:
Lynda - Techniques for Developing Secure Software
文件类型:
文件数目:
42个文件
文件大小:
166.83 MB
收录时间:
2016-1-26 11:34
已经下载:
3次
资源热度:
109
最近下载:
2024-12-26 08:47
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:29E2BB2AAEC6BB2F2A5F3D2748421DF00C9A0F9C&dn=Lynda - Techniques for Developing Secure Software
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Lynda - Techniques for Developing Secure Software.torrent
020 Case study - Pattern-Oriented Architectural Analysis.mp45.97MB
032 Other secure coding best practices.mp45.96MB
027 Broken authentication and session management countermeasures.mp45.63MB
022 Software security anti-patterns.mp45.21MB
016 Security vulnerabilities.mp45.17MB
017 Architectural analysis for security.mp45.1MB
003 Significance of software security.mp44.99MB
025 Buffer overflow countermeasures.mp44.91MB
010 Architectural-level threats.mp44.82MB
009 Detailed design-level threats.mp44.71MB
024 Buffer overflow attacks.mp44.64MB
034 Static analysis.mp44.58MB
040 Vulnerability management.mp44.54MB
035 Exploring tools for static analysis.mp44.5MB
021 Case study - Vulnerability-Oriented Architectural Analysis.mp44.46MB
007 Hardware-level threats.mp44.43MB
013 Introduction to secure design.mp44.38MB
006 Software security resources.mp44.33MB
015 Security patterns.mp44.31MB
036 Dynamic analysis.mp44.18MB
031 Sensitive data exposure countermeasures.mp44.12MB
038 Penetration testing.mp44.1MB
008 Code-level threats.mp44.08MB
037 Exploring tools for dynamic analysis.mp44.06MB
011 Requirements-level threats.mp43.98MB
019 Case study - Tactic-Oriented Architectural Analysis.mp43.97MB
014 Security tactics.mp43.81MB
012 Threat modeling and tools.mp43.81MB
028 Insecure direct object references.mp43.8MB
005 Software security risk management.mp43.65MB
001 Welcome.mp43.4MB
023 Introduction to secure coding.mp43.18MB
033 Testing for security.mp43.11MB
026 Broken authentication and session management.mp42.98MB
030 Sensitive information exposure.mp42.96MB
004 Software security vocabulary.mp42.89MB
002 What is software security_.mp42.63MB
039 Exploring tools for penetration testing.mp42.31MB
029 Insecure direct object references countermeasures.mp42.18MB
042 Next steps.mp42.17MB
018 Case study - Setting the Stage.mp41.5MB
041 Exploring tools for vulnerabilty management.mp41.34MB