| | 020 Case study - Pattern-Oriented Architectural Analysis.mp4 | 5.97 MB |
| | 032 Other secure coding best practices.mp4 | 5.96 MB |
| | 027 Broken authentication and session management countermeasures.mp4 | 5.63 MB |
| | 022 Software security anti-patterns.mp4 | 5.21 MB |
| | 016 Security vulnerabilities.mp4 | 5.17 MB |
| | 017 Architectural analysis for security.mp4 | 5.1 MB |
| | 003 Significance of software security.mp4 | 4.99 MB |
| | 025 Buffer overflow countermeasures.mp4 | 4.91 MB |
| | 010 Architectural-level threats.mp4 | 4.82 MB |
| | 009 Detailed design-level threats.mp4 | 4.71 MB |
| | 024 Buffer overflow attacks.mp4 | 4.64 MB |
| | 034 Static analysis.mp4 | 4.58 MB |
| | 040 Vulnerability management.mp4 | 4.54 MB |
| | 035 Exploring tools for static analysis.mp4 | 4.5 MB |
| | 021 Case study - Vulnerability-Oriented Architectural Analysis.mp4 | 4.46 MB |
| | 007 Hardware-level threats.mp4 | 4.43 MB |
| | 013 Introduction to secure design.mp4 | 4.38 MB |
| | 006 Software security resources.mp4 | 4.33 MB |
| | 015 Security patterns.mp4 | 4.31 MB |
| | 036 Dynamic analysis.mp4 | 4.18 MB |
| | 031 Sensitive data exposure countermeasures.mp4 | 4.12 MB |
| | 038 Penetration testing.mp4 | 4.1 MB |
| | 008 Code-level threats.mp4 | 4.08 MB |
| | 037 Exploring tools for dynamic analysis.mp4 | 4.06 MB |
| | 011 Requirements-level threats.mp4 | 3.98 MB |
| | 019 Case study - Tactic-Oriented Architectural Analysis.mp4 | 3.97 MB |
| | 014 Security tactics.mp4 | 3.81 MB |
| | 012 Threat modeling and tools.mp4 | 3.81 MB |
| | 028 Insecure direct object references.mp4 | 3.8 MB |
| | 005 Software security risk management.mp4 | 3.65 MB |
All Comments