Softwaretechnik II, WS 2015/2016, gehalten am 08.02.2016, Vorlesung 26-02
Autor
Beteiligtes Institut
Institut für Programmstrukturen und Datenorganisation (IPD)
Genre
Beschreibung
- 0:00:00 Starten
- 0:01:36 How to find Security Requirements
- 0:02:08 Design Phase
- 0:04:46 Principles for Building Secure Software I
- 0:10:43 Principles for Building Secure Software II
- 0:14:28 Principles for Building Secure Software III
- 0:20:24 Further Helpful Security Patterns/Idioms
- 0:23:56 Implementation
- 0:27:58 Potenzial Security Issues
- 0:28:58 Some Testing Guidlines I
- 0:35:03 Somes Testing Guidelines II
- 0:39:06 Security Evaluation
- 0:41:28 Security Issues: Race Conditions I
- 0:45:03 Security Issues: Race Conditions II
- 0:49:59 Race Conditions Solutions
- 0:51:20 Butter Overflows
- 0:53:43 Butter Overflow Example
- 0:56:00 SQL Injection
- 0:59:24 Solution: Input Validation
- 1:04:25 Cryptography
- 1:06:40 Pseudo Randomness
- 1:12:53 Conclusion
- 1:18:16 Topic 16 Continuos Integration
- 1:18:38 Overview on Today´s Lecture
- 1:19:15 Motivation(1)
- 1:20:11 Motivation(2)
- 1:25:24 Continuous Integration - A Definition
Laufzeit (hh:mm:ss)
01:26:45
Serie
Softwaretechnik II, Vorlesung, WS 2015/2016
Publiziert am
18.02.2016
Fachgebiet
Lizenz
Auflösung | 1280 x 720 Pixel |
Seitenverhältnis | 16:9 |
Audiobitrate | 127730 bps |
Audio Kanäle | 2 |
Audio Codec | aac |
Audio Abtastrate | 48000 Hz |
Gesamtbitrate | 402427 bps |
Farbraum | yuv420p |
Container | mov,mp4,m4a,3gp,3g2,mj2 |
Medientyp | video/mp4 |
Dauer | 5205 s |
Dateiname | DIVA-2016-182_hd.mp4 |
Dateigröße | 4.096 byte |
Bildwiederholfrequenz | 25 |
Videobitrate | 268594 bps |
Video Codec | h264 |
Embed-Code
Softwaretechnik II, Vorlesung, WS 2015/2016
Folgen 1-28
von 28