| Name | Last modified | Size | Description | |
|---|---|---|---|---|
| Parent Directory | - | |||
| 1-1 Course Overview.pdf | 2013-03-04 09:54 | 269K | ||
| 1-1 Introduction.pdf | 2013-03-04 09:54 | 359K | ||
| 1-1 Lifecycle.pdf | 2013-03-04 09:54 | 390K | ||
| 1-2 Misuse and Abuse Cases.pdf | 2013-03-06 09:50 | 329K | ||
| 3-1 Risk Assessment.pdf | 2013-03-18 09:54 | 408K | ||
| 3-2 Design Patterns.pdf | 2013-03-20 09:57 | 359K | ||
| 3-2 Test Planning.pdf | 2013-03-20 09:57 | 355K | ||
| 4-1 Threat Modeling.pdf | 2013-03-25 09:53 | 462K | ||
| 4-2 Defensive Coding.pdf | 2013-03-27 09:40 | 543K | ||
| 5-1 Defensive Coding 2.pdf | 2013-04-03 09:53 | 764K | ||
| 5-2 Code Inspections.pdf | 2013-04-03 09:53 | 364K | ||
| 6-2 Permissions.pdf | 2013-04-10 16:08 | 478K | ||
| 8-1 Cryptography.pdf | 2013-04-22 09:37 | 520K | ||
| 8-2 Cryptography 2.pdf | 2013-04-24 09:57 | 309K | ||
| 9-1 Deployment and Distribution.pdf | 2013-04-29 09:41 | 418K | ||
| 9-2 Insider Threat.pdf | 2013-05-08 09:44 | 327K | ||
| X-1 CVSS.pdf | 2013-05-08 09:44 | 407K | ||
| X-2 Black Box Testing.pdf | 2013-05-08 09:44 | 265K | ||