磁力狗

磁力狗

BT种子名称

请保存以下最新地址

BT种子基本信息

  • 种子哈希:2b9484dc8e1d8bd57562ca842bc37ee5bdde7bbf
  • 文档大小:2.3 GB
  • 文档个数:210个文档
  • 下载次数:2314
  • 下载速度:极快
  • 收录时间:2023-06-01
  • 最近下载:2024-12-28
  • DMCA/屏蔽:DMCA/屏蔽

下载磁力链接

magnet:?xt=urn:btih:2B9484DC8E1D8BD57562CA842BC37EE5BDDE7BBFmagnet:?xt=urn:btih:2B9484DC8E1D8BD57562CA842BC37EE5BDDE7BBF
复制磁力链接到PikPak、utorrent、Bitcomet、迅雷、115、百度网盘等下载工具进行下载。
[CourserHub.com] Coursera - Secure Software Design Specialization的二维码

文档列表

  • mp4software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.mp4 130.8 MB
  • mp4software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.mp4 104.7 MB
  • mp4software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.mp4 102.7 MB
  • mp4software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.mp4 97.0 MB
  • mp4software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.mp4 90.0 MB
  • mp4software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.mp4 72.0 MB
  • mp4software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.mp4 71.4 MB
  • mp4software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.mp4 71.3 MB
  • mp4software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.mp4 71.3 MB
  • mp4software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.mp4 70.0 MB
  • mp4software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.mp4 65.8 MB
  • mp4software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.mp4 64.5 MB
  • mp4software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.mp4 63.1 MB
  • mp4software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.mp4 60.3 MB
  • mp4software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.mp4 59.1 MB
  • mp4software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.mp4 59.0 MB
  • mp4software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.mp4 57.3 MB
  • mp4software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.mp4 50.6 MB
  • mp4software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.mp4 49.8 MB
  • mp4software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.mp4 49.2 MB
  • ==查看完整文档列表==
>