Lynda - CISSP Cert Prep 8 Software Development Security/1. Introduction/01. Welcome.mp4 |
40.6 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/1. Introduction/02. Application security.mp4 |
10.2 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/1. Introduction/02. Application security.en.srt |
7 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/1. Introduction/01. Welcome.en.srt |
4 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/2. 1. Software Development Lifecycle/03. Development methodologies.mp4 |
17.7 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.mp4 |
7.1 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/2. 1. Software Development Lifecycle/04. Maturity models.mp4 |
6.8 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/2. 1. Software Development Lifecycle/06. DevOps.mp4 |
6.5 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/2. 1. Software Development Lifecycle/03. Development methodologies.en.srt |
11 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/2. 1. Software Development Lifecycle/06. DevOps.en.srt |
7 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/2. 1. Software Development Lifecycle/04. Maturity models.en.srt |
6 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.en.srt |
5 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/07. Understanding cross-site scripting.mp4 |
14 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/08. Preventing SQL injection.mp4 |
12 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/11. Overflow attacks.mp4 |
10.2 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/13. Session hijacking.mp4 |
9.1 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/10. Directory traversal.mp4 |
7.6 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/15. Code execution attacks.mp4 |
7.1 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/14. Malicious add-ons.mp4 |
6.6 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/12. Cookies.mp4 |
6.5 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/09. Privilege escalation.mp4 |
3.8 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/07. Understanding cross-site scripting.en.srt |
10 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/08. Preventing SQL injection.en.srt |
9 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/13. Session hijacking.en.srt |
7 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/10. Directory traversal.en.srt |
6 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/11. Overflow attacks.en.srt |
6 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/12. Cookies.en.srt |
5 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/15. Code execution attacks.en.srt |
5 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/14. Malicious add-ons.en.srt |
4 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/3. 2. Software Security Issues/09. Privilege escalation.en.srt |
4 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/4. 3. Secure Coding Practices/17. Code repositories.mp4 |
14.6 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/4. 3. Secure Coding Practices/18. Third-party code.mp4 |
10.2 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/4. 3. Secure Coding Practices/16. Error and exception handling.mp4 |
7.5 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/4. 3. Secure Coding Practices/19. Code signing.mp4 |
5.3 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/4. 3. Secure Coding Practices/17. Code repositories.en.srt |
11 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/4. 3. Secure Coding Practices/18. Third-party code.en.srt |
8 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/4. 3. Secure Coding Practices/16. Error and exception handling.en.srt |
6 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/4. 3. Secure Coding Practices/19. Code signing.en.srt |
5 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/5. 4. Software Security Assessment/20. Risk analysis and mitigation.mp4 |
6.3 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/5. 4. Software Security Assessment/22. Acquired software.mp4 |
5.7 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/5. 4. Software Security Assessment/21. Software testing.mp4 |
5 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/5. 4. Software Security Assessment/20. Risk analysis and mitigation.en.srt |
6 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/5. 4. Software Security Assessment/21. Software testing.en.srt |
5 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/5. 4. Software Security Assessment/22. Acquired software.en.srt |
5 KB |
Lynda - CISSP Cert Prep 8 Software Development Security/6. Conclusion/23. What's next.mp4 |
3.6 MB |
Lynda - CISSP Cert Prep 8 Software Development Security/6. Conclusion/23. What's next.en.srt |
2 KB |