Softwaretechnik II, WS 2015/2016, gehalten am 08.02.2016, Vorlesung 26-02
Autor
Beteiligtes Institut
Institut für Programmstrukturen und Datenorganisation (IPD)
Genre
Beschreibung
26-02: Vorlesung |
0:00:00 Starten
0:01:36 How to find Security Requirements
0:02:08 Design Phase
0:04:46 Principles for Building Secure Software I
0:10:43 Principles for Building Secure Software II
0:14:28 Principles for Building Secure Software III
0:20:24 Further Helpful Security Patterns/Idioms
0:23:56 Implementation
0:27:58 Potenzial Security Issues
0:28:58 Some Testing Guidlines I
0:35:03 Somes Testing Guidelines II
0:39:06 Security Evaluation
0:41:28 Security Issues: Race Conditions I
0:45:03 Security Issues: Race Conditions II
0:49:59 Race Conditions Solutions
0:51:20 Butter Overflows
0:53:43 Butter Overflow Example
0:56:00 SQL Injection
0:59:24 Solution: Input Validation
1:04:25 Cryptography
1:06:40 Pseudo Randomness
1:12:53 Conclusion
1:18:16 Topic 16 Continuos Integration
1:18:38 Overview on Today´s Lecture
1:19:15 Motivation(1)
1:20:11 Motivation(2)
1:25:24 Continuous Integration - A Definition
Laufzeit (hh:mm:ss)
01:26:45
Serie
Softwaretechnik II, Vorlesung, WS 2015/2016
Publiziert am
18.02.2016
Fachgebiet
Lizenz
Auflösung | 1280 x 720 Pixel |
Seitenverhältnis | 16:9 |
Audiobitrate | 127730 bps |
Audio Kanäle | 2 |
Audio Codec | aac |
Audio Abtastrate | 48000 Hz |
Gesamtbitrate | 402427 bps |
Farbraum | yuv420p |
Container | mov,mp4,m4a,3gp,3g2,mj2 |
Medientyp | video/mp4 |
Dauer | 5205 s |
Dateiname | DIVA-2016-182_hd.mp4 |
Dateigröße | 4.096 byte |
Bildwiederholfrequenz | 25 |
Videobitrate | 268594 bps |
Video Codec | h264 |
Embed-Code