مالک است
فقط مشاهده
بارگذاری و ویرایش

maryland_software_security

توسط adam S. 58,886 KB • 103 فایل

گزارش سوء استفاده
به صورت فایل زیپ دانلود کن
به حساب کاربری من اضافه شود
 
نام اندازه داده اضافه شد به حساب کاربری اضافه شود
2 - 1 - Introducing Computer Security (6_17).srt
2 - 2 - What is software security_ (7_48).srt
2 - 3 - Tour of the course and expected background (11_37).srt
3 - 1 - Low Level Security_ Introduction (7_35).srt
3 - 2 - Memory Layout (11_16).srt
3 - 3 - Buffer Overflow (6_23).srt
3 - 4 - Code Injection (6_15).srt
3 - 5 - Other Memory Exploits (11_52).srt
3 - 6 - Format String Vulnerabilities (6_41) .srt
4 - 1 - Defenses Against Low-Level Attacks_ Introduction (2_58).srt
4 - 2 - Memory Safety (16_56).srt
4 - 3 - Type Safety (4_39).srt
4 - 4 - Avoiding Exploitation (9_38).srt
4 - 5 - Return Oriented Programming - ROP (11_30).srt
4 - 6 - Control Flow Integrity (14_51).srt
4 - 7 - Secure Coding (18_29).srt
5 - 1 - Security for the Web_ Introduction (3_33).srt
5 - 2 - Web Basics (10_31).srt
5 - 3 - SQL Injection (10_35).srt
5 - 4 - SQL Injection Countermeasures (9_17).srt
5 - 5 - Web-based State Using Hidden Fields and Cookies (13_51).srt
5 - 6 - Session Hijacking (6_56).srt
5 - 7 - Cross-site Request Forgery - CSRF (6_36).srt
5 - 8 - Web 2.0 (5_12).srt
5 - 9 - Cross-site Scripting (13_39).srt
5 - 10 - Interview with Kevin Haley (21_13).srt
6 - 1 - Designing and Building Secure Software_ Introduction (7_23).srt
6 - 2 - Threat Modeling, or Architectural Risk Analysis (9_25).srt
6 - 3 - Security Requirements (13_26).srt
6 - 4 - Avoiding Flaws with Principles (8_12).srt

بررسي فايلهاي 30 office در فولدر maryland_software_security 4shared من

We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree