![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | X-2 Black Box Testing.pdf | 2013-05-08 09:44 | 265K | |
![]() | X-1 CVSS.pdf | 2013-05-08 09:44 | 407K | |
![]() | 9-2 Insider Threat.pdf | 2013-05-08 09:44 | 327K | |
![]() | 9-1 Deployment and Distribution.pdf | 2013-04-29 09:41 | 418K | |
![]() | 8-2 Cryptography 2.pdf | 2013-04-24 09:57 | 309K | |
![]() | 8-1 Cryptography.pdf | 2013-04-22 09:37 | 520K | |
![]() | 6-2 Permissions.pdf | 2013-04-10 16:08 | 478K | |
![]() | 5-2 Code Inspections.pdf | 2013-04-03 09:53 | 364K | |
![]() | 5-1 Defensive Coding 2.pdf | 2013-04-03 09:53 | 764K | |
![]() | 4-2 Defensive Coding.pdf | 2013-03-27 09:40 | 543K | |
![]() | 4-1 Threat Modeling.pdf | 2013-03-25 09:53 | 462K | |
![]() | 3-2 Test Planning.pdf | 2013-03-20 09:57 | 355K | |
![]() | 3-2 Design Patterns.pdf | 2013-03-20 09:57 | 359K | |
![]() | 3-1 Risk Assessment.pdf | 2013-03-18 09:54 | 408K | |
![]() | 1-2 Misuse and Abuse Cases.pdf | 2013-03-06 09:50 | 329K | |
![]() | 1-1 Lifecycle.pdf | 2013-03-04 09:54 | 390K | |
![]() | 1-1 Introduction.pdf | 2013-03-04 09:54 | 359K | |
![]() | 1-1 Course Overview.pdf | 2013-03-04 09:54 | 269K | |