O'Reilly - Introduction to Secure Software
File List
- 02. Security Engineering/02_04-Security Protocols.mp4 109.7 MB
- 07. Attacks/07_06-TLS Attacks BEAST, BREACH, CRIME.mp4 90.0 MB
- 06. Web Security/06_01-Password Policies.mp4 86.3 MB
- 06. Web Security/06_05-Feature OAuth.mp4 85.0 MB
- 01. Introduction/01_02-Attacks in the News.mp4 59.1 MB
- 04. Threat Modeling/04_04-Accounts.mp4 58.2 MB
- 01. Introduction/01_07-Attacking Infrastructure.mp4 54.5 MB
- 06. Web Security/06_08-Feature CORS.mp4 54.5 MB
- 01. Introduction/01_04-Trusted vs Trustworthy.mp4 53.5 MB
- 02. Security Engineering/02_02-Economics of Security.mp4 52.3 MB
- 06. Web Security/06_04-Feature TLS.mp4 48.9 MB
- 03. Software Security/03_01-Introduction to Software Security.mp4 48.1 MB
- 02. Security Engineering/02_01-Introduction to Security Engineering.mp4 47.5 MB
- 03. Software Security/03_11-Tools.mp4 47.4 MB
- 08. The Future/08_02-Next Steps.mp4 44.0 MB
- 03. Software Security/03_10-Principle Trust Judiciously.mp4 43.4 MB
- 08. The Future/08_01-The Future.mp4 42.8 MB
- 02. Security Engineering/02_03-Motivation.mp4 42.1 MB
- 03. Software Security/03_08-Principle Least Privilege.mp4 41.5 MB
- 04. Threat Modeling/04_03-Attack Trees.mp4 41.2 MB
- 03. Software Security/03_04-Architectural Risk Assessment.mp4 40.7 MB
- 01. Introduction/01_03-What We Tell Others.mp4 40.4 MB
- 05. Security in the Organization/05_01-Introduction to Security in the Organization.mp4 37.0 MB
- 04. Threat Modeling/04_05-Web and Cloud.mp4 36.2 MB
- 06. Web Security/06_06-Feature HTTP Signatures.mp4 35.6 MB
- 01. Introduction/01_08-Convincing Developers.mp4 35.5 MB
- 03. Software Security/03_03-Security Testing.mp4 34.5 MB
- 03. Software Security/03_07-Principle Fail Securely.mp4 33.4 MB
- 05. Security in the Organization/05_02-Stakeholders.mp4 32.3 MB
- 01. Introduction/01_05-Security Features.mp4 32.0 MB
- 01. Introduction/01_09-Beyond Perimeter Defense.mp4 31.9 MB
- 07. Attacks/07_03-XSS and HTML Injection.mp4 31.9 MB
- 03. Software Security/03_09-Principle Log Securely.mp4 31.6 MB
- 05. Security in the Organization/05_03-Teams Security Teams.mp4 31.6 MB
- 05. Security in the Organization/05_06-Software Lifecycles.mp4 31.4 MB
- 07. Attacks/07_02-Phishing.mp4 29.6 MB
- 04. Threat Modeling/04_01-Introduction to Threat Modeling.mp4 27.5 MB
- 06. Web Security/06_07-Feature JWT.mp4 27.3 MB
- 06. Web Security/06_09-Feature CSP.mp4 26.8 MB
- 07. Attacks/07_08-TLS Attacks POODLE.mp4 26.7 MB
- 03. Software Security/03_05-Principle Protecting the Weakest Link.mp4 26.2 MB
- 03. Software Security/03_06-Principle Defense in Depth.mp4 26.0 MB
- 07. Attacks/07_04-CSRF.mp4 24.2 MB
- 06. Web Security/06_02-Feature HTTP Basic.mp4 24.1 MB
- 01. Introduction/01_06-Principle of Least Privilege.mp4 24.0 MB
- 06. Web Security/06_10-Feature HSTS.mp4 23.6 MB
- 06. Web Security/06_03-Feature HTTP Digest.mp4 22.8 MB
- 03. Software Security/03_02-Risk Management.mp4 21.9 MB
- 04. Threat Modeling/04_02-STRIDE.mp4 21.5 MB
- 07. Attacks/07_05-SQL Injection.mp4 19.4 MB
- 06. Web Security/06_11-Feature WAFs and Firewalls.mp4 18.5 MB
- 05. Security in the Organization/05_05-Teams Operations.mp4 17.0 MB
- 05. Security in the Organization/05_04-Teams Developers.mp4 13.7 MB
- 07. Attacks/07_01-Attack Overview.mp4 5.3 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.