[CourserHub.com] Coursera - Secure Software Design Specialization

磁链地址复制复制磁链成功
磁链详情
文件数目:210个文件
文件大小:2.12 GB
收录时间:2025-06-19
访问次数:1
相关内容:CourserHubCourseraSecureSoftwareDesignSpecialization
文件meta
  • software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.mp4
    124.7 MB
  • software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.mp4
    99.87 MB
  • software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.mp4
    97.96 MB
  • software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.mp4
    92.51 MB
  • software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.mp4
    85.87 MB
  • software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.mp4
    68.7 MB
  • software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.mp4
    68.13 MB
  • software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.mp4
    68.04 MB
  • software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.mp4
    67.97 MB
  • software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.mp4
    66.78 MB
  • software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.mp4
    62.72 MB
  • software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.mp4
    61.47 MB
  • software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.mp4
    60.15 MB
  • software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.mp4
    57.46 MB
  • software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.mp4
    56.33 MB
  • software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.mp4
    56.26 MB
  • software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.mp4
    54.6 MB
  • software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.mp4
    48.25 MB
  • software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.mp4
    47.52 MB
  • software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.mp4
    46.97 MB
  • software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.mp4
    44.3 MB
  • software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.mp4
    43.88 MB
  • software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.mp4
    43.67 MB
  • software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.mp4
    42.7 MB
  • software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.mp4
    41.92 MB
  • software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.mp4
    41.72 MB
  • software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.mp4
    40.27 MB
  • software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.mp4
    40.13 MB
  • software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.mp4
    38.43 MB
  • software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.mp4
    37.8 MB
  • software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.mp4
    34.63 MB
  • software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.mp4
    32.68 MB
  • software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.mp4
    29.7 MB
  • software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.mp4
    29.16 MB
  • software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.mp4
    27 MB
  • software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.mp4
    24.88 MB
  • software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.mp4
    22.92 MB
  • software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.mp4
    21.47 MB
  • software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.mp4
    19.87 MB
  • software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.mp4
    19.86 MB
  • software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.mp4
    19.79 MB
  • software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.mp4
    17.94 MB
  • software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.mp4
    16.89 MB
  • software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.mp4
    15.66 MB
  • software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.mp4
    13.66 MB
  • software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.mp4
    9.57 MB
  • software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.mp4
    5.09 MB
  • software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/02_additional-resource_ourusoff--introduction_to_jackson_design_method.pdf
    971.85 KB
  • software-design-methods-tools/05_ethics/02_project-ethics-ii/02_additional-resource_12-ethical-dilemmas-gnawing-at-developers-today.html
    167.19 KB
  • software-design-methods-tools/04_unit-testing/02_using-junit/02_additional-resource_junit_quick_guide.htm
    117.22 KB
©2018 ciligou.app 磁力狗 v2.0
使用必读|联系我们|资源导航|种子提交