fileLynda-Techniques-for-Dev-13sUh

Lynda Techniques for Developing Secure Software
  • MP4020 Case study - Pattern-Oriented Architectural Analysis.mp45.97MB
  • MP4032 Other secure coding best practices.mp45.96MB
  • MP4027 Broken authentication and session nagement countermeasures.mp45.63MB
  • MP4022 Software security anti-patterns.mp45.21MB
  • MP4016 Security vulnerabilities.mp45.17MB
  • MP4017 Architectural ysis for security.mp45.10MB
  • MP4003 Significance of software security.mp44.99MB
  • MP4025 Buffer overflow countermeasures.mp44.91MB
  • MP4010 Architectural-level threats.mp44.82MB
  • MP4009 Detailed design-level threats.mp44.71MB
  • MP4024 Buffer overflow attacks.mp44.64MB
  • MP4034 Static ysis.mp44.58MB
  • MP4040 Vulnerability nagement.mp44.54MB
  • MP4035 Exploring tools for static ysis.mp44.50MB
  • MP4021 Case study - Vulnerability-Oriented Architectural Analysis.mp44.46MB
  • MP4007 Hardware-level threats.mp44.43MB
  • MP4013 Introduction to secure design.mp44.38MB
  • MP4006 Software security resources.mp44.33MB
  • MP4015 Security patterns.mp44.31MB
  • MP4036 Dynamic ysis.mp44.18MB
  • MP4031 Sensitive data exposure countermeasures.mp44.12MB
  • MP4038 Penetration testing.mp44.10MB
  • MP4008 Code-level threats.mp44.08MB
  • MP4037 Exploring tools for dynamic ysis.mp44.06MB
  • MP4011 Requirements-level threats.mp43.98MB
  • MP4019 Case study - Tactic-Oriented Architectural Analysis.mp43.97MB
  • MP4014 Security tactics.mp43.81MB
  • MP4012 Threat modeling and tools.mp43.81MB
  • MP4028 Insecure direct ob<x>ject references.mp43.80MB
  • MP4005 Software security risk nagement.mp43.65MB
  • MP4001 Welcome.mp43.40MB
  • MP4023 Introduction to secure coding.mp43.18MB
  • MP4033 Testing for security.mp43.11MB
  • MP4026 Broken authentication and session nagement.mp42.98MB
  • MP4030 Sensitive infortion exposure.mp42.96MB
  • MP4004 Software security vocabulary.mp42.89MB
  • MP4002 What is software security_.mp42.63MB
  • MP4039 Exploring tools for penetration testing.mp42.31MB
  • MP4029 Insecure direct ob<x>ject references countermeasures.mp42.18MB
  • MP4042 Next steps.mp42.17MB
  • MP4018 Case study - Setting the Stage.mp41.50MB
  • MP4041 Exploring tools for vulnerabilty nagement.mp41.34MB
Latest Search: 1.SOE-812   2.MXSPS-208   3.QQ-028   4.UMD-361   5.MCSR-036   6.MIBD-523   7.DV-315   8.SVDVD-129   9.MGDV-003   10.HNDB-012   11.OKDX-001   12.SNFD-019   13.RKI-256   14.DVH-570   15.HIB-31   16.DV-1141   17.BIB-009   18.JUSD-334   19.JUC-099   20.ONSD-456   21.MIBD-727   22.KIBD-124   23.SCOP-029   24.MIBD-634   25.DFDA-081   26.SDDL-464   27.MIBD-638   28.ONSD-508   29.XV-608   30.SOE-499   31.SUPD-071   32.MIBD-594   33.MDED-439   34.SAK-011   35.MDPD-072   36.EMAZ-180   37.MDED-403   38.JUK-001   39.GEN-022   40.PKMS-03   41.MIBD-558   42.RKI-194   43.SOE-841   44.AAJB-010   45.DVH-620   46.MBYD-070   47.YLW-4043   48.IKD-007   49.ASW-065   50.HITMA-94   51.SOE-975   52.MAMA-308   53.SS-006   54.KDG-021   55.TMVI-028   56.TEN-20   57.HODV-20543   58.IBW-273   59.AST-27   60.ANND-135   61.MILV-039   62.GKD-013   63.DV-643   64.AEIL-085   65.FE-718   66.T28-261   67.ARMD-578   68.DSE-041   69.MMV-075D   70.DKSW-202   71.812   72.208   73.028   74.361   75.036   76.523   77.315   78.129   79.003   80.012   81.001   82.019   83.256   84.570   85.31   86.1   87.009   88.334   89.099   90.456   91.727   92.124   93.029   94.634   95.081   96.4   97.638   98.508   99.608   100.499   101.071   102.594   103.439   104.011   105.072   106.180   107.403   108.001   109.022   110.03   111.558   112.194   113.841   114.010   115.620   116.070   117.4043   118.007   119.065   120.94   121.975   122.308   123.006   124.021   125.028   126.20   127.20543   128.273   129.27   130.135   131.039   132.013   133.3   134.085   135.718   136.261   137.578   138.041   139.075D   140.202