Lynda - Techniques for Developing Secure Software
File List
- 04. Secure Software Design/04_08-Case study PatternOriented Architectural Analysis.mp4 6.0 MB
- 05. Secure Coding/05_10-Other secure coding best practices.mp4 6.0 MB
- 05. Secure Coding/05_05-Broken authentication and session management countermeasures.mp4 5.6 MB
- 04. Secure Software Design/04_10-Software security antipatterns.mp4 5.2 MB
- 04. Secure Software Design/04_04-Security vulnerabilities.mp4 5.2 MB
- 04. Secure Software Design/04_05-Architectural analysis for security.mp4 5.1 MB
- 02. Understanding Software Security/02_02-Significance of software security.mp4 5.0 MB
- 05. Secure Coding/05_03-Buffer overflow countermeasures.mp4 4.9 MB
- 03. Software Security Threats/03_04-Architecturallevel threats.mp4 4.8 MB
- 03. Software Security Threats/03_03-Detailed designlevel threats.mp4 4.7 MB
- 05. Secure Coding/05_02-Buffer overflow attacks.mp4 4.6 MB
- 06. Testing for Security/06_02-Static analysis.mp4 4.6 MB
- 06. Testing for Security/06_08-Vulnerability management.mp4 4.5 MB
- 06. Testing for Security/06_03-Exploring tools for static analysis.mp4 4.5 MB
- 04. Secure Software Design/04_09-Case study VulnerabilityOriented Architectural Analysis.mp4 4.5 MB
- 03. Software Security Threats/03_01-Hardwarelevel threats.mp4 4.4 MB
- 04. Secure Software Design/04_01-Introduction to secure design.mp4 4.4 MB
- 02. Understanding Software Security/02_05-Software security resources.mp4 4.3 MB
- 04. Secure Software Design/04_03-Security patterns.mp4 4.3 MB
- 06. Testing for Security/06_04-Dynamic analysis.mp4 4.2 MB
- 05. Secure Coding/05_09-Sensitive data exposure countermeasures.mp4 4.1 MB
- 06. Testing for Security/06_06-Penetration testing.mp4 4.1 MB
- 03. Software Security Threats/03_02-Codelevel threats.mp4 4.1 MB
- 06. Testing for Security/06_05-Exploring tools for dynamic analysis.mp4 4.1 MB
- 03. Software Security Threats/03_05-Requirementslevel threats.mp4 4.0 MB
- 04. Secure Software Design/04_07-Case study TacticOriented Architectural Analysis.mp4 4.0 MB
- 04. Secure Software Design/04_02-Security tactics.mp4 3.8 MB
- 03. Software Security Threats/03_06-Threat modeling and tools.mp4 3.8 MB
- 05. Secure Coding/05_06-Insecure direct object references.mp4 3.8 MB
- 02. Understanding Software Security/02_04-Software security risk management.mp4 3.7 MB
- 01. Introduction/01_01-Welcome.mp4 3.4 MB
- 05. Secure Coding/05_01-Introduction to secure coding.mp4 3.2 MB
- 06. Testing for Security/06_01-Testing for security.mp4 3.1 MB
- 05. Secure Coding/05_04-Broken authentication and session management.mp4 3.0 MB
- 05. Secure Coding/05_08-Sensitive information exposure.mp4 3.0 MB
- 02. Understanding Software Security/02_03-Software security vocabulary.mp4 2.9 MB
- 02. Understanding Software Security/02_01-What is software security.mp4 2.6 MB
- 06. Testing for Security/06_07-Exploring tools for penetration testing.mp4 2.3 MB
- 05. Secure Coding/05_07-Insecure direct object references countermeasures.mp4 2.2 MB
- 07. Conclusion/07_01-Next steps.mp4 2.2 MB
- 04. Secure Software Design/04_06-Case study Setting the Stage.mp4 1.5 MB
- 06. Testing for Security/06_09-Exploring tools for vulnerabilty management.mp4 1.3 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.