Intoduction to Secure Software

Introduction to Secure Software Training Video  eBooks & eLearning

Posted by IrGens at March 18, 2016
Introduction to Secure Software Training Video

Introduction to Secure Software Training Video
2016-03-17 | .MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 64 kbps, 2 Ch | 8.25 hours | 2.04 GB
Instructor: Brian Sletten

Rocket: Eight Lessons To Secure Infinite Growth (Audiobook)  eBooks & eLearning

Posted by Grev27 at July 19, 2016
Rocket: Eight Lessons To Secure Infinite Growth (Audiobook)

Rocket: Eight Lessons To Secure Infinite Growth By Michael J. Silverstein, read by Jim Tedder
2016 | ASIN: B01B89SSBO, ISBN: 1522690395 | English | M4B@64 kbps | 12 hrs 33 min | 342 MB

Hacked: The Inside Story of America's Struggle to Secure Cyberspace  eBooks & eLearning

Posted by libr at July 17, 2016
Hacked: The Inside Story of America's Struggle to Secure Cyberspace

Hacked: The Inside Story of America's Struggle to Secure Cyberspace by Charlie Mitchell
English | 2016 | ISBN: 1442255218 | 320 pages | PDF | 1,9 MB

Building Software That Lasts - A Guide to Maintainable Software  eBooks & eLearning

Posted by naag at June 1, 2016
Building Software That Lasts - A Guide to Maintainable Software

Building Software That Lasts - A Guide to Maintainable Software
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 330 MB
Genre: eLearning | Language: English

Will your software outlast the original developers? Almost certainly yes. But will you be able to maintain it? This course will teach you how to maintain cost-efficient and functioning software through planning and development strategies.

Techniques for Developing Secure Software  eBooks & eLearning

Posted by naag at April 29, 2016
Techniques for Developing Secure Software

Techniques for Developing Secure Software
Size: 168MB | Duration: 1h 01m | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

Rocket: Eight Lessons to Secure Infinite Growth  

Posted by arundhati at Feb. 2, 2016
Rocket: Eight Lessons to Secure Infinite Growth

Michael J. Silverstein, Dylan Bolden, "Rocket: Eight Lessons to Secure Infinite Growth"
2015 | ISBN: 1259585425 | 320 pages | EPUB, MOBI, AZW3 | 3 MB
Oil's Endless Bid: Taming the Unreliable Price of Oil to Secure Our Economy

Oil's Endless Bid: Taming the Unreliable Price of Oil to Secure Our Economy by Dan Dicker
English | 2011 | ISBN: 0470915625 | 338 pages | PDF | 4,3 MB
Engineering Secure Software and Systems: 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015 (Repost)

Engineering Secure Software and Systems: 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015
Publisher: Springer | 2015 | ISBN: 3319156179 | 227 pages | PDF | 5,72 MB

This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions.

Lynda - Techniques for Developing Secure Software  

Posted by U.N.Owen at Nov. 12, 2015
Lynda - Techniques for Developing Secure Software

Lynda - Techniques for Developing Secure Software
Size: 168MB | Duration: 1h 01m | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

Software developers are constantly told to use secure coding practices. Luckily, with today's tools, secure code doesn't take a lot of time or effort. There are security frameworks (authentication, authorization, etc. ) developers can use as their own. There are also static and dynamic code analysis tools to test code. Plus, with security patterns that can be implemented at the design level—before coding ever begins—you can make sure you're not reinventing the wheel. Jungwoo Ryoo is a faculty member teaching cybersecurity and information technology at Penn State. In this course, he'll introduce secure software development tools and frameworks and teach secure coding practices such as input validation, separation of concerns, and single access point.

Engineering Secure Software and Systems (Repost)  

Posted by bookwarrior at Sept. 14, 2015
Engineering Secure Software and Systems (Repost)

Engineering Secure Software and Systems: 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings By Frank Piessens, Juan Caballero, Nataliia Bielova
2015 | 240 Pages | ISBN: 3319156179 | PDF | 5 MB