Download link
File List
-
01. Introduction/01_02-Attacks in the News.mp4 59.14 MB
01. Introduction/01_03-What We Tell Others.mp4 40.42 MB
01. Introduction/01_04-Trusted vs Trustworthy.mp4 53.45 MB
01. Introduction/01_05-Security Features.mp4 31.99 MB
01. Introduction/01_06-Principle of Least Privilege.mp4 24 MB
01. Introduction/01_07-Attacking Infrastructure.mp4 54.49 MB
01. Introduction/01_08-Convincing Developers.mp4 35.49 MB
01. Introduction/01_09-Beyond Perimeter Defense.mp4 31.91 MB
02. Security Engineering/02_01-Introduction to Security Engineering.mp4 47.53 MB
02. Security Engineering/02_02-Economics of Security.mp4 52.28 MB
02. Security Engineering/02_03-Motivation.mp4 42.05 MB
02. Security Engineering/02_04-Security Protocols.mp4 109.67 MB
03. Software Security/03_01-Introduction to Software Security.mp4 48.14 MB
03. Software Security/03_02-Risk Management.mp4 21.92 MB
03. Software Security/03_03-Security Testing.mp4 34.55 MB
03. Software Security/03_04-Architectural Risk Assessment.mp4 40.71 MB
03. Software Security/03_05-Principle Protecting the Weakest Link.mp4 26.17 MB
03. Software Security/03_06-Principle Defense in Depth.mp4 25.95 MB
03. Software Security/03_07-Principle Fail Securely.mp4 33.44 MB
03. Software Security/03_08-Principle Least Privilege.mp4 41.53 MB
03. Software Security/03_09-Principle Log Securely.mp4 31.63 MB
03. Software Security/03_10-Principle Trust Judiciously.mp4 43.37 MB
03. Software Security/03_11-Tools.mp4 47.39 MB
04. Threat Modeling/04_01-Introduction to Threat Modeling.mp4 27.49 MB
04. Threat Modeling/04_02-STRIDE.mp4 21.55 MB
04. Threat Modeling/04_03-Attack Trees.mp4 41.2 MB
04. Threat Modeling/04_04-Accounts.mp4 58.16 MB
04. Threat Modeling/04_05-Web and Cloud.mp4 36.24 MB
05. Security in the Organization/05_01-Introduction to Security in the Organization.mp4 37.03 MB
05. Security in the Organization/05_02-Stakeholders.mp4 32.32 MB
05. Security in the Organization/05_03-Teams Security Teams.mp4 31.61 MB
05. Security in the Organization/05_04-Teams Developers.mp4 13.74 MB
05. Security in the Organization/05_05-Teams Operations.mp4 17 MB
05. Security in the Organization/05_06-Software Lifecycles.mp4 31.37 MB
06. Web Security/06_01-Password Policies.mp4 86.28 MB
06. Web Security/06_02-Feature HTTP Basic.mp4 24.15 MB
06. Web Security/06_03-Feature HTTP Digest.mp4 22.76 MB
06. Web Security/06_04-Feature TLS.mp4 48.87 MB
06. Web Security/06_05-Feature OAuth.mp4 84.98 MB
06. Web Security/06_06-Feature HTTP Signatures.mp4 35.56 MB
06. Web Security/06_07-Feature JWT.mp4 27.3 MB
06. Web Security/06_08-Feature CORS.mp4 54.47 MB
06. Web Security/06_09-Feature CSP.mp4 26.77 MB
06. Web Security/06_10-Feature HSTS.mp4 23.57 MB
06. Web Security/06_11-Feature WAFs and Firewalls.mp4 18.52 MB
07. Attacks/07_01-Attack Overview.mp4 5.33 MB
07. Attacks/07_02-Phishing.mp4 29.56 MB
07. Attacks/07_03-XSS and HTML Injection.mp4 31.89 MB
07. Attacks/07_04-CSRF.mp4 24.16 MB
07. Attacks/07_05-SQL Injection.mp4 19.36 MB
07. Attacks/07_06-TLS Attacks BEAST, BREACH, CRIME.mp4 89.97 MB
07. Attacks/07_08-TLS Attacks POODLE.mp4 26.67 MB
08. The Future/08_01-The Future.mp4 42.76 MB
08. The Future/08_02-Next Steps.mp4 43.99 MB
Download Info
-
Tips
“O'Reilly - Introduction to Secure Software” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.