|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585б |
| 0 |
452б |
| 005 - Introduction.mp4 |
23.71Мб |
| 006 - Identify Security Requirements and Expectations.mp4 |
309.53Мб |
| 007 - Activity - Identifying Security Requirements and Expectations.mp4 |
129.38Мб |
| 008 - Identify Factors that Undermine Software Security.mp4 |
219.73Мб |
| 009 - Identify Factors that Undermine Software Security, Part 2.mp4 |
93.34Мб |
| 010 - Find Vulnerabilities in Your Software.mp4 |
265.17Мб |
| 011 - Activity - Identifying Vulnerabilities in an Application.mp4 |
120.29Мб |
| 012 - Building and Breaking Passwords.mp4 |
183.00Мб |
| 013 - Activity - Adding a Security Feature to Your Code.mp4 |
75.62Мб |
| 014 - Activity - Protect Against a Poison Null Byte.mp4 |
95.55Мб |
| 015 - Activity - Hashing a Password.mp4 |
60.51Мб |
| 016 - Activity - Securing the Password Hash.mp4 |
60.02Мб |
| 017 - Activity - Saving Hashes for Future Use.mp4 |
58.59Мб |
| 018 - Activity - Validating a Password.mp4 |
54.83Мб |
| 019 - Activity - Having Fun With a Modern Hashing Algorithm.mp4 |
66.10Мб |
| 020 - Gather Intelligence on Vulnerabilities and Exploits.mp4 |
93.59Мб |
| 021 - Handle Vulnerabilities Due to Software Defects and Misconfiguration.mp4 |
338.57Мб |
| 022 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2.mp4 |
271.75Мб |
| 023 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3.mp4 |
192.69Мб |
| 024 - Activity Examining the Web App Functionality.mp4 |
200.06Мб |
| 025 - Activity Examining the Project Files for Security Concerns.mp4 |
225.42Мб |
| 026 - Handle Error Messaging.mp4 |
266.41Мб |
| 027 - Activity Identifying Software Defects and Misconfiguration.mp4 |
136.18Мб |
| 028 - Handle Vulnerabilities Due to Human Factors.mp4 |
263.53Мб |
| 029 - Handle Vulnerabilities Due to Human Factors, Part 2.mp4 |
119.52Мб |
| 030 - Activity Managing People Risks.mp4 |
145.00Мб |
| 031 - Handle Vulnerabilities Due to Process Shortcomings.mp4 |
251.26Мб |
| 032 - Handle Vulnerabilities Due to Process Shortcomings, Part 2.mp4 |
116.87Мб |
| 033 - Handle Vulnerabilities Due to Process Shortcomings, Part 3.mp4 |
224.13Мб |
| 034 - Activity Managing Software Development Process Risks.mp4 |
84.11Мб |
| 035 - Apply General Principles for Secure Design.mp4 |
191.76Мб |
| 036 - Apply General Principles for Secure Design, Part 2.mp4 |
121.82Мб |
| 037 - Use Secure Design Patterns.mp4 |
272.14Мб |
| 038 - Activity Avoiding Common Security Design Flaws.mp4 |
39.30Мб |
| 039 - Design Software to Counter Specific Threats.mp4 |
311.84Мб |
| 040 - Design Software to Counter Specific Threats, Part 2.mp4 |
400.77Мб |
| 041 - Activity Identifying Threats and Countermeasures.mp4 |
70.82Мб |
| 042 - Follow Best Practices for Secure Coding.mp4 |
289.66Мб |
| 043 - Activity Researching Secure Coding Best Practices.mp4 |
190.55Мб |
| 044 - Prevent Memory Errors.mp4 |
193.04Мб |
| 045 - Prevent Memory Errors, Part 2.mp4 |
165.84Мб |
| 046 - Maintain Secure Formatting and Resource Access.mp4 |
250.61Мб |
| 047 - Activity Preventing a Race Condition.mp4 |
57.66Мб |
| 048 - Prevent Privacy Vulnerabilities.mp4 |
334.32Мб |
| 049 - Activity Handling Privacy Defects.mp4 |
61.75Мб |
| 050 - Prevent Platform Vulnerabilities, Part 1.mp4 |
268.46Мб |
| 051 - Prevent Platform Vulnerabilities, Part 2.mp4 |
343.94Мб |
| 052 - Activity Staging an XSS Attack on the Web App.mp4 |
149.35Мб |
| 053 - Prevent Mobile Platform Vulnerabilities.mp4 |
229.43Мб |
| 054 - Prevent Mobile Platform Vulnerabilities, Part 2.mp4 |
244.16Мб |
| 055 - Prevent IoT Platform Vulnerabilities.mp4 |
81.97Мб |
| 056 - Prevent Desktop Platform Vulnerabilities.mp4 |
233.47Мб |
| 057 - Limit Access Using Session Control.mp4 |
222.35Мб |
| 058 - Limit Access Using Session Control, Part 2.mp4 |
222.33Мб |
| 059 - Activity Handling Authentication and Authorization Defects.mp4 |
180.28Мб |
| 060 - Limit Access with User Accounts.mp4 |
266.40Мб |
| 061 - Protect Data with Cryptography.mp4 |
133.13Мб |
| 062 - Activity Having Fun with Symmetric Encryption.mp4 |
138.27Мб |
| 063 - Activity Having Fun with Asymmetric Encryption.mp4 |
119.13Мб |
| 064 - Extend Cryptosystems with PKI.mp4 |
204.27Мб |
| 065 - Extend Cryptosystems with PKI, Part 2.mp4 |
134.51Мб |
| 066 - Activity Protecting Data in Transit and at Rest.mp4 |
113.05Мб |
| 067 - Implement Error Handling and Logging.mp4 |
270.49Мб |
| 068 - Activity Reviewing Error Handling.mp4 |
55.48Мб |
| 069 - Activity Improving Error Handling.mp4 |
99.15Мб |
| 070 - Protect Sensitive Data and Functions, Part 1.mp4 |
239.21Мб |
| 071 - Protect Sensitive Data and Functions, Part 2.mp4 |
137.16Мб |
| 072 - Preparing Chrome to Tamper with a Website.mp4 |
56.28Мб |
| 073 - Activity Tampering with Website Data and Functions.mp4 |
154.42Мб |
| 074 - Protect Database Access.mp4 |
295.34Мб |
| 075 - Activity SQL Injection.mp4 |
210.17Мб |
| 076 - Activity SQL Injection, Part 2.mp4 |
114.92Мб |
| 077 - Perform Security Testing.mp4 |
313.13Мб |
| 078 - Analyze Code to Find Security Problems.mp4 |
104.90Мб |
| 079 - Activity Performing Code Analysis.mp4 |
86.42Мб |
| 080 - Use Automated Testing Tools to Find Security Problems.mp4 |
107.06Мб |
| 081 - Activity Using a Test Suite to Automate Unit Testing.mp4 |
52.99Мб |
| 082 - Monitor and Log Applications to Support Security.mp4 |
250.87Мб |
| 083 - Activity Monitoring and Logging a Deployed Application.mp4 |
85.67Мб |
| 084 - Maintain Security After Deployment.mp4 |
249.23Мб |
| 085 - Activity Analyzing Suspicious Binaries.mp4 |
140.14Мб |
| 086 - Course Summary.mp4 |
17.52Мб |
| 1 |
1.23Мб |
| 10 |
1.86Мб |
| 11 |
256.13Кб |
| 12 |
1.51Мб |
| 13 |
1.54Мб |
| 14 |
1.59Мб |
| 15 |
1.60Мб |
| 16 |
851.79Кб |
| 17 |
486.13Кб |
| 18 |
758.09Кб |
| 19 |
1.13Мб |
| 2 |
58.03Кб |
| 20 |
1.39Мб |
| 21 |
788.40Кб |
| 22 |
1.84Мб |
| 23 |
808.59Кб |
| 24 |
544.55Кб |
| 25 |
580.93Кб |
| 26 |
593.03Кб |
| 27 |
1.87Мб |
| 28 |
1.65Мб |
| 29 |
1.67Мб |
| 3 |
1.43Мб |
| 30 |
281.55Кб |
| 31 |
1.83Мб |
| 32 |
1.73Мб |
| 33 |
1.94Мб |
| 34 |
984.19Кб |
| 35 |
1.31Мб |
| 36 |
248.31Кб |
| 37 |
1.45Мб |
| 38 |
1.00Мб |
| 39 |
1.72Мб |
| 4 |
1.68Мб |
| 40 |
162.84Кб |
| 41 |
1.58Мб |
| 42 |
669.47Кб |
| 43 |
1.00Мб |
| 44 |
1.86Мб |
| 45 |
1.73Мб |
| 46 |
855.81Кб |
| 47 |
1.82Мб |
| 48 |
1.49Мб |
| 49 |
885.95Кб |
| 5 |
888.46Кб |
| 50 |
637.68Кб |
| 51 |
186.34Кб |
| 52 |
1.71Мб |
| 53 |
489.72Кб |
| 54 |
890.90Кб |
| 55 |
1.13Мб |
| 56 |
1.08Мб |
| 57 |
974.30Кб |
| 58 |
962.85Кб |
| 59 |
1.10Мб |
| 6 |
160.05Кб |
| 60 |
871.10Кб |
| 61 |
463.26Кб |
| 62 |
415.00Кб |
| 63 |
680.64Кб |
| 64 |
1.58Мб |
| 65 |
338.77Кб |
| 66 |
1.89Мб |
| 67 |
31.14Кб |
| 68 |
385.05Кб |
| 69 |
1.18Мб |
| 7 |
484.55Кб |
| 70 |
1.90Мб |
| 71 |
252.04Кб |
| 72 |
1.49Мб |
| 73 |
1.98Мб |
| 74 |
1.41Мб |
| 75 |
344.55Кб |
| 76 |
1.72Мб |
| 77 |
537.40Кб |
| 78 |
1.17Мб |
| 79 |
1.01Мб |
| 8 |
672.30Кб |
| 80 |
712.85Кб |
| 81 |
297.61Кб |
| 82 |
490.97Кб |
| 9 |
346.33Кб |
| CSC-210 Lab Setup Guide.docx.pdf |
468.19Кб |
| CSC-210 Links.pdf |
141.65Кб |
| csclab.zip |
431.40Мб |
| Lab Troubleshooting.docx.pdf |
2.89Мб |
| TutsNode.com.txt |
63б |