Intoduction to Secure Software

Introduction to Secure Software Training Video  eBooks & eLearning

Posted by IrGens at March 18, 2016
Introduction to Secure Software Training Video

Introduction to Secure Software Training Video
2016-03-17 | .MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 64 kbps, 2 Ch | 8.25 hours | 2.04 GB
Instructor: Brian Sletten
The Family Constitution: Agreements to Secure and Perpetuate Your Family and Your Business (A Family Business Publication)

The Family Constitution: Agreements to Secure and Perpetuate Your Family and Your Business (A Family Business Publication) by J. Ward
English | 2010 | ISBN: 0230111165, 9780230111165, B00RTYM580 | 100 Pages | PDF | 7.77 MB

Engineering Secure Software and Systems (repost)  eBooks & eLearning

Posted by interes at March 29, 2017
Engineering Secure Software and Systems (repost)

Engineering Secure Software and Systems by Úlfar Erlingsson, Roel Wieringa, Nicola Zannone
English | 2011 | ISBN: 364219124X | 284 pages | PDF | 4,5 MB

A Guide to Selecting Software Measures and Metrics  eBooks & eLearning

Posted by AlenMiler at March 9, 2017
A Guide to Selecting Software Measures and Metrics

A Guide to Selecting Software Measures and Metrics by Capers Jones
English | 17 Apr. 2017 | ISBN: 1138033073 | 372 Pages | PDF (True) | 3.17 MB

Engineering Safe and Secure Software Systems (Repost)  eBooks & eLearning

Posted by DZ123 at Feb. 6, 2017
Engineering Safe and Secure Software Systems (Repost)

C. Warren Axelrod, "Engineering Safe and Secure Software Systems"
English | 2012 | ISBN: 1608074722 | PDF | pages: 349 | 2.3 mb

Intoduction to Web Design in Photoshop  eBooks & eLearning

Posted by naag at Jan. 22, 2017
Intoduction to Web Design in Photoshop

Intoduction to Web Design in Photoshop
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3.5 Hours | Lec: | 738 MB
Genre: eLearning | Language: English

From Zero to Hero. Start with no knowledge of design, finish with new skill in hand. At the end of the course you will be able to design any types of web home pages and make a career as certified Freelance Web Designer.

Using OAuth to Secure Your ASP.NET API [repost]  eBooks & eLearning

Posted by naag at Jan. 21, 2017
Using OAuth to Secure Your ASP.NET API [repost]

Using OAuth to Secure Your ASP.NET API
Size: 753 MB | Duration: 3h 52m | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 44.1KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

Global Initiatives to Secure Cyberspace: An Emerging Landscape (Repost)  eBooks & eLearning

Posted by step778 at Jan. 21, 2017
Global Initiatives to Secure Cyberspace: An Emerging Landscape (Repost)

Michael Portnoy, Seymour Goodman, "Global Initiatives to Secure Cyberspace: An Emerging Landscape"
2008 | pages: 174 | ISBN: 0387097635 | PDF | 1,4 mb
The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (Developer Best Practices)

The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (Developer Best Practices) by Michael Howard
English | June 28, 2006 | ISBN: 0735622140 | 348 Pages | PDF | 21 MB

Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL—from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization.

Architecting Secure Software Systems (Repost)  eBooks & eLearning

Posted by leonardo78 at Jan. 16, 2017
Architecting Secure Software Systems (Repost)

Architecting Secure Software Systems by Asoke K. Talukder, Manish Chaitanya
Publisher: Auerbach Publications | 2008 | ISBN: 1420087843 | 446 pages | PDF | 3,5 MB

Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle.