Владелец
Только чтение
Чтение и запись

maryland_software_security

от adam S. 1,191,714 KB • 158 файлов

Сообщить о нарушениях
Скачать в формате Zip
Добавить в мой аккаунт
     
Имя Размер Дата добавления Добавить в аккаунт
2 - 1 - Introducing Computer Security (6_17).mp4
2 - 1 - Introducing Computer Security (6_17).srt
2 - 2 - What is software security_ (7_48).mp4
2 - 2 - What is software security_ (7_48).srt
2 - 3 - Tour of the course and expected background (11_37).mp4
2 - 3 - Tour of the course and expected background (11_37).srt
3 - 1 - Low Level Security_ Introduction (7_35).mp4
3 - 1 - Low Level Security_ Introduction (7_35).srt
3 - 2 - Memory Layout (11_16).mp4
3 - 2 - Memory Layout (11_16).srt
3 - 3 - Buffer Overflow (6_23).mp4
3 - 3 - Buffer Overflow (6_23).srt
3 - 4 - Code Injection (6_15).mp4
3 - 4 - Code Injection (6_15).srt
3 - 5 - Other Memory Exploits (11_52).mp4
3 - 5 - Other Memory Exploits (11_52).srt
3 - 6 - Format String Vulnerabilities (6_41) .mp4
3 - 6 - Format String Vulnerabilities (6_41) .srt
4 - 2 - Memory Safety (16_56).mp4
4 - 2 - Memory Safety (16_56).srt
4 - 3 - Type Safety (4_39).mp4
4 - 3 - Type Safety (4_39).srt
4 - 4 - Avoiding Exploitation (9_38).mp4
4 - 4 - Avoiding Exploitation (9_38).srt
4 - 5 - Return Oriented Programming - ROP (11_30).mp4
4 - 5 - Return Oriented Programming - ROP (11_30).srt
4 - 6 - Control Flow Integrity (14_51).mp4
4 - 6 - Control Flow Integrity (14_51).srt

Посмотрите файлы 30 video, office в моей папке 4shared maryland_software_security

We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree