เจ้าของ
แบบดูได้อย่างเดียว
การอัปโหลดและแก้ไข

maryland_software_security

โดย adam S. 1,191,714 KB • 158 ไฟล์

แจ้งการใช้ในทางที่ผิด
ดาวน์โหลดเป็น Zip
เพิ่มลงในบัญชีผู้ใช้ของฉัน
 
2 - 1 - Introducing Computer Security (6_17).mp4
2 - 1 - Introducing Computer Security (6_17).srt
2 - 2 - What is software security_ (7_48).mp4
2 - 2 - What is software security_ (7_48).srt
2 - 3 - Tour of the course and expected background (11_37).mp4
2 - 3 - Tour of the course and expected background (11_37).srt
3 - 1 - Low Level Security_ Introduction (7_35).mp4
3 - 1 - Low Level Security_ Introduction (7_35).srt
3 - 2 - Memory Layout (11_16).mp4
3 - 2 - Memory Layout (11_16).srt
3 - 3 - Buffer Overflow (6_23).mp4
3 - 3 - Buffer Overflow (6_23).srt
3 - 4 - Code Injection (6_15).mp4
3 - 4 - Code Injection (6_15).srt
3 - 5 - Other Memory Exploits (11_52).mp4
3 - 5 - Other Memory Exploits (11_52).srt
3 - 6 - Format String Vulnerabilities (6_41) .mp4
3 - 6 - Format String Vulnerabilities (6_41) .srt
4 - 1 - Defenses Against Low-Level Attacks_ Introduction (2_58).mp4
4 - 1 - Defenses Against Low-Level Attacks_ Introduction (2_58).srt
4 - 2 - Memory Safety (16_56).mp4
4 - 2 - Memory Safety (16_56).srt
4 - 3 - Type Safety (4_39).mp4
4 - 3 - Type Safety (4_39).srt
4 - 4 - Avoiding Exploitation (9_38).mp4
4 - 4 - Avoiding Exploitation (9_38).srt
4 - 5 - Return Oriented Programming - ROP (11_30).mp4
4 - 5 - Return Oriented Programming - ROP (11_30).srt
4 - 6 - Control Flow Integrity (14_51).mp4
4 - 6 - Control Flow Integrity (14_51).srt

ตรวจสอบ 30 video, office ไฟล์ที่แฟ้ม 4shared ของฉัน maryland_software_security

We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree