| | | 020 Case study - Pattern-Oriented Architectural Analysis.mp4 | 5.97 MB |
| | | 032 Other secure coding best practices.mp4 | 5.96 MB |
| | | 027 Broken authentication and session management countermeasures.mp4 | 5.63 MB |
| | | 022 Software security anti-patterns.mp4 | 5.21 MB |
| | | 016 Security vulnerabilities.mp4 | 5.17 MB |
| | | 017 Architectural analysis for security.mp4 | 5.1 MB |
| | | 003 Significance of software security.mp4 | 4.99 MB |
| | | 025 Buffer overflow countermeasures.mp4 | 4.91 MB |
| | | 010 Architectural-level threats.mp4 | 4.82 MB |
| | | 009 Detailed design-level threats.mp4 | 4.71 MB |
| | | 024 Buffer overflow attacks.mp4 | 4.64 MB |
| | | 034 Static analysis.mp4 | 4.58 MB |
| | | 040 Vulnerability management.mp4 | 4.54 MB |
| | | 035 Exploring tools for static analysis.mp4 | 4.5 MB |
| | | 021 Case study - Vulnerability-Oriented Architectural Analysis.mp4 | 4.46 MB |
| | | 007 Hardware-level threats.mp4 | 4.43 MB |
| | | 013 Introduction to secure design.mp4 | 4.38 MB |
| | | 006 Software security resources.mp4 | 4.33 MB |
| | | 015 Security patterns.mp4 | 4.31 MB |
| | | 036 Dynamic analysis.mp4 | 4.18 MB |
| | | 031 Sensitive data exposure countermeasures.mp4 | 4.12 MB |
| | | 038 Penetration testing.mp4 | 4.1 MB |
| | | 008 Code-level threats.mp4 | 4.08 MB |
| | | 037 Exploring tools for dynamic analysis.mp4 | 4.06 MB |
| | | 011 Requirements-level threats.mp4 | 3.98 MB |
| | | 019 Case study - Tactic-Oriented Architectural Analysis.mp4 | 3.97 MB |
| | | 014 Security tactics.mp4 | 3.81 MB |
| | | 012 Threat modeling and tools.mp4 | 3.81 MB |
| | | 028 Insecure direct object references.mp4 | 3.8 MB |
| | | 005 Software security risk management.mp4 | 3.65 MB |
All Comments