Владелец
Только чтение
Чтение и запись

maryland_software_security

от adam S. 58,886 KB • 103 файлов

Сообщить о нарушениях
Скачать в формате Zip
Добавить в мой аккаунт
 
Имя Размер Дата добавления Добавить в аккаунт
2 - 1 - Introducing Computer Security (6_17).srt
2 - 2 - What is software security_ (7_48).srt
2 - 3 - Tour of the course and expected background (11_37).srt
3 - 1 - Low Level Security_ Introduction (7_35).srt
3 - 2 - Memory Layout (11_16).srt
3 - 3 - Buffer Overflow (6_23).srt
3 - 4 - Code Injection (6_15).srt
3 - 5 - Other Memory Exploits (11_52).srt
3 - 6 - Format String Vulnerabilities (6_41) .srt
4 - 2 - Memory Safety (16_56).srt
4 - 3 - Type Safety (4_39).srt
4 - 4 - Avoiding Exploitation (9_38).srt
4 - 5 - Return Oriented Programming - ROP (11_30).srt
4 - 6 - Control Flow Integrity (14_51).srt
4 - 7 - Secure Coding (18_29).srt
5 - 1 - Security for the Web_ Introduction (3_33).srt
5 - 2 - Web Basics (10_31).srt
5 - 3 - SQL Injection (10_35).srt
5 - 4 - SQL Injection Countermeasures (9_17).srt
5 - 6 - Session Hijacking (6_56).srt
5 - 7 - Cross-site Request Forgery - CSRF (6_36).srt
5 - 8 - Web 2.0 (5_12).srt
5 - 9 - Cross-site Scripting (13_39).srt
5 - 10 - Interview with Kevin Haley (21_13).srt
6 - 3 - Security Requirements (13_26).srt
6 - 4 - Avoiding Flaws with Principles (8_12).srt

Посмотрите файлы 30 office в моей папке 4shared maryland_software_security

We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree