![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | pdf/ | 2013-05-08 09:44 | - | |
![]() | 9-1 Deployment and Distribution.pptx | 2013-04-29 09:41 | 151K | |
![]() | 8-2 Cryptography 2.pptx | 2013-04-24 09:57 | 104K | |
![]() | 8-1 Cryptography.pptx | 2013-04-22 09:37 | 181K | |
![]() | 6-2 Permissions.pptx | 2013-04-10 16:08 | 135K | |
![]() | 5-1 Defensive Coding 2.pptx | 2013-04-03 09:53 | 80K | |
![]() | 4-2 Defensive Coding.pptx | 2013-03-27 09:40 | 79K | |
![]() | 4-1 Threat Modeling.pptx | 2013-03-25 09:53 | 568K | |
![]() | 3-2 Test Planning.pptx | 2013-03-20 09:57 | 68K | |
![]() | 3-2 Design Patterns.pptx | 2013-03-20 09:57 | 68K | |
![]() | Z Test-Driven Development.pptx | 2013-03-18 09:54 | 82K | |
![]() | 1-2 Misuse and Abuse Cases.pptx | 2013-03-06 09:50 | 92K | |
![]() | 1-1 Lifecycle.pptx | 2013-03-04 09:54 | 93K | |
![]() | 1-1 Introduction.pptx | 2013-03-04 09:54 | 68K | |
![]() | 1-1 Course Overview.pptx | 2013-03-04 09:54 | 53K | |
![]() | X-2 Black Box Testing.pptx | 2013-02-11 10:52 | 63K | |
![]() | X-1 CVSS.pptx | 2013-02-11 10:52 | 83K | |
![]() | 9-2 Insider Threat.pptx | 2013-02-06 12:27 | 232K | |
![]() | 5-2 Code Inspections.pptx | 2013-01-09 12:10 | 1.7M | |
![]() | 2-1 Risk Assessment.pptx | 2012-12-03 12:53 | 164K | |