磁力狗
导航切换
首页
最新地址
最新地址
最新地址
最新地址
搜索磁力
BT种子名称
[CourserHub.com] Coursera - Secure Software Design Specialization
请保存以下最新地址
clgou.icu
clgougou.cyou
clg.dog
磁力.dog
BT种子基本信息
种子哈希:
2b9484dc8e1d8bd57562ca842bc37ee5bdde7bbf
文档大小:
2.3 GB
文档个数:
210
个文档
下载次数:
2314
次
下载速度:
极快
收录时间:
2023-06-01
最近下载:
2024-12-28
DMCA/屏蔽:
DMCA/屏蔽
下载磁力链接
magnet:?xt=urn:btih:2B9484DC8E1D8BD57562CA842BC37EE5BDDE7BBF
复制磁力链接到
PikPak
、utorrent、Bitcomet、迅雷、115、百度网盘等下载工具进行下载。
下载BT种子
磁力链接
种子下载
迅雷下载
二维码
YouTube成人版
91视频
91短视频
51品茶
逼哩逼哩
萝莉岛
欲漫涩
草榴社区
含羞草
抖阴破解版
TikTok成人版
成人快手
乱伦社区
91AV
暗网禁地
文档列表
software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.mp4
130.8 MB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.mp4
104.7 MB
software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.mp4
102.7 MB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.mp4
97.0 MB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.mp4
90.0 MB
software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.mp4
72.0 MB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.mp4
71.4 MB
software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.mp4
71.3 MB
software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.mp4
71.3 MB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.mp4
70.0 MB
software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.mp4
65.8 MB
software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.mp4
64.5 MB
software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.mp4
63.1 MB
software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.mp4
60.3 MB
software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.mp4
59.1 MB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.mp4
59.0 MB
software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.mp4
57.3 MB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.mp4
50.6 MB
software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.mp4
49.8 MB
software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.mp4
49.2 MB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.mp4
46.5 MB
software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.mp4
46.0 MB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.mp4
45.8 MB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.mp4
44.8 MB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.mp4
44.0 MB
software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.mp4
43.7 MB
software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.mp4
42.2 MB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.mp4
42.1 MB
software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.mp4
40.3 MB
software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.mp4
39.6 MB
software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.mp4
36.3 MB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.mp4
34.3 MB
software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.mp4
31.1 MB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.mp4
30.6 MB
software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.mp4
28.3 MB
software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.mp4
26.1 MB
software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.mp4
24.0 MB
software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.mp4
22.5 MB
software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.mp4
20.8 MB
software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.mp4
20.8 MB
software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.mp4
20.8 MB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.mp4
18.8 MB
software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.mp4
17.7 MB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.mp4
16.4 MB
software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.mp4
14.3 MB
software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.mp4
10.0 MB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.mp4
5.3 MB
software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/02_additional-resource_ourusoff--introduction_to_jackson_design_method.pdf
995.2 kB
software-design-methods-tools/05_ethics/02_project-ethics-ii/02_additional-resource_12-ethical-dilemmas-gnawing-at-developers-today.html
171.2 kB
software-design-methods-tools/04_unit-testing/02_using-junit/02_additional-resource_junit_quick_guide.htm
120.0 kB
software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/02_additional-resource_C9.pdf
57.1 kB
software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/02_additional-resource_bb727010.aspx
49.4 kB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_index.html
45.0 kB
software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/02_additional-resource_rhp_c_dm_designing_seq_dgrms.html
43.7 kB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/02_additional-resource_sdlc_overview.htm
35.0 kB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/02_additional-resource_second-normal-form.htm
34.7 kB
software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.en.srt
22.2 kB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.en.srt
21.8 kB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_DataConsiten_Norm3NF.html
21.2 kB
software-design-methods-tools/04_unit-testing/01_junit-install/02_testrunner-download_TestRunner.zip
20.3 kB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.en.srt
18.3 kB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.en.srt
18.2 kB
software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.en.srt
17.8 kB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.en.srt
17.8 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/02_additional-resource_korthof78.htm
16.4 kB
software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.en.srt
14.8 kB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.en.srt
14.5 kB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.en.txt
13.5 kB
software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.en.txt
13.4 kB
software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.en.srt
13.1 kB
software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.en.srt
12.9 kB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.en.srt
12.2 kB
software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.en.srt
11.6 kB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.en.srt
11.6 kB
software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.en.srt
11.5 kB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.en.txt
11.4 kB
software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.en.srt
11.4 kB
software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.en.srt
11.2 kB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.en.txt
11.2 kB
software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.en.srt
11.1 kB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.en.txt
11.1 kB
software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.en.txt
11.1 kB
software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.en.srt
11.0 kB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.en.srt
11.0 kB
software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.en.srt
11.0 kB
software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.en.srt
10.7 kB
software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.en.srt
10.4 kB
software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.en.srt
10.2 kB
software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.en.srt
10.0 kB
software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.en.srt
9.7 kB
software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.en.txt
9.2 kB
software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.en.srt
9.0 kB
software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.en.srt
8.9 kB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/02_how-high-level-design-or-architecture-handles-security-problems_quiz.html
8.7 kB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.en.txt
8.6 kB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.en.srt
8.6 kB
software-design-development-life-cycle/05_final-exam/01_final-exam/05_assessment-5_exam.html
8.4 kB
software-design-development-life-cycle/05_final-exam/01_final-exam/03_assessment-3_exam.html
8.4 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.en.srt
8.4 kB
software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.en.txt
8.1 kB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/03_introduction-to-secure-software-design_quiz.html
8.1 kB
software-design-development-life-cycle/05_final-exam/01_final-exam/01_assessment-1_exam.html
8.0 kB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.en.srt
8.0 kB
software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.en.txt
7.9 kB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/03_how-design-fits_quiz.html
7.9 kB
software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.en.srt
7.9 kB
software-design-development-life-cycle/05_final-exam/01_final-exam/04_assessment-4_exam.html
7.9 kB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/03_design-in-the-context-of-different-sdlc-s_quiz.html
7.9 kB
software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.en.srt
7.8 kB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.en.srt
7.7 kB
software-design-development-life-cycle/05_final-exam/01_final-exam/02_assessment-2_exam.html
7.6 kB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.en.txt
7.6 kB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.en.srt
7.5 kB
software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.en.txt
7.3 kB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.en.txt
7.3 kB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/02_additional-resource_abstraction.html
7.2 kB
software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.en.srt
7.2 kB
software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.en.txt
7.1 kB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.en.txt
7.0 kB
software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.en.txt
7.0 kB
software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.en.txt
7.0 kB
software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.en.srt
7.0 kB
software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.en.txt
6.9 kB
software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.en.txt
6.8 kB
software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.en.txt
6.5 kB
software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.en.txt
6.5 kB
software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.en.txt
6.4 kB
software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.en.txt
6.4 kB
software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.en.srt
6.4 kB
software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.en.txt
6.3 kB
software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.en.srt
6.2 kB
software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.en.srt
6.0 kB
software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.en.txt
5.8 kB
software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.en.srt
5.7 kB
software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.en.txt
5.5 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.en.srt
5.5 kB
software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.en.txt
5.5 kB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.en.txt
5.5 kB
software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/02_additional-resource_what-is-z.html
5.4 kB
software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.en.srt
5.2 kB
software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.en.srt
5.2 kB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.en.txt
5.1 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.en.txt
5.1 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.en.srt
5.0 kB
software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.en.txt
4.9 kB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.en.txt
4.9 kB
software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.en.txt
4.8 kB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.en.txt
4.6 kB
software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.en.srt
4.6 kB
software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.en.txt
4.2 kB
software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.en.txt
4.1 kB
software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.en.txt
3.9 kB
software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.en.txt
3.8 kB
software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.en.txt
3.8 kB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.en.srt
3.8 kB
software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.en.txt
3.6 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.en.txt
3.3 kB
software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.en.txt
3.1 kB
software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.en.txt
3.1 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.en.txt
3.0 kB
software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.en.txt
2.8 kB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.en.txt
2.3 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.en.srt
1.8 kB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_instructions.html
1.5 kB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/02_additional-resource_instructions.html
1.5 kB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/02_additional-resource_instructions.html
1.4 kB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/02_additional-resource_instructions.html
1.3 kB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/02_additional-resource_instructions.html
1.3 kB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/02_additional-resource_instructions.html
1.3 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/02_additional-resource_instructions.html
1.3 kB
software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/02_additional-resource_instructions.html
1.2 kB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/02_additional-resource_instructions.html
1.2 kB
software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/02_additional-resource_instructions.html
1.2 kB
software-design-methods-tools/05_ethics/02_project-ethics-ii/02_additional-resource_instructions.html
1.2 kB
software-design-abstraction/03_what-if-there-are-no-users/02_database-design/02_additional-resource_instructions.html
1.2 kB
software-design-methods-tools/05_ethics/01_ethics-i/02_additional-resource_instructions.html
1.2 kB
software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/02_additional-resource_instructions.html
1.2 kB
software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/02_additional-resource_instructions.html
1.2 kB
software-design-abstraction/02_focus-on-the-users/02_user-experience/02_additional-resource_instructions.html
1.2 kB
software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/02_additional-resource_instructions.html
1.2 kB
software-design-abstraction/06_language-choices/02_operating-system-selection/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.en.txt
1.1 kB
software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/02_additional-resource_instructions.html
1.1 kB
software-design-abstraction/02_focus-on-the-users/01_user-interface-design/02_additional-resource_instructions.html
1.1 kB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/02_additional-resource_instructions.html
1.1 kB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/02_additional-resource_instructions.html
1.1 kB
software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/02_additional-resource_instructions.html
1.1 kB
software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/02_additional-reading_instructions.html
1.1 kB
software-design-methods-tools/04_unit-testing/02_using-junit/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/02_additional-resource_instructions.html
1.1 kB
software-design-abstraction/06_language-choices/01_languages-and-operating-systems/02_additional-resource_instructions.html
1.1 kB
software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/02_additional-resource_instructions.html
1.1 kB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/02_additional-resource_instructions.html
1.1 kB
software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/02_additional-resource_instructions.html
1.1 kB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/02_additional-resource_instructions.html
1.1 kB
software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/02_additional-resource_instructions.html
1.1 kB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/02_additional-resource_instructions.html
1.1 kB
software-design-methods-tools/04_unit-testing/01_junit-install/02_testrunner-download_instructions.html
1.0 kB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/02_additional-resource_e_dta-sw-design-high-level.php
783 Bytes
0. Websites you may like/[CourserHub.com].url
123 Bytes
Readme.txt
51 Bytes
==查看完整文档列表==
下一个:
German Pistols and Holsters 1934-1945
118.7 MB
猜你喜欢
[ DevCourseWeb.com ] Udemy - Secure Software...
456.0 MB
[ DevCourseWeb.com ] Udemy - Secure Software Design...
455.5 MB
[ DevCourseWeb.com ] Udemy - Secure Software...
353.7 MB
[ FreeCourseWeb.com ] Packt - How to Secure Oracle...
838.1 MB
[CBT Nuggets] Cisco CCNP Security SECURE 642-637
2.8 GB
DarkX.19.09.19.Emma.Starletto.Perimeter.Secure.XXX.SD.MP4-KLEENEX
250.1 MB
Silent Hill Soundtracks (EAC-SECURE-FLAC)
2.2 GB
NordVPN- VPN Fast, Secure & Unlimited v4.5.2 APK +...
169.5 MB
Using OAuth to Secure Your ASP.NET API
764.6 MB
[DarkX] Emma Starletto - Perimeter Secure (19.09.2019) rq.mp4
250.1 MB