
Softwaretechnik II, WS 2015/2016, gehalten am 08.02.2016, Vorlesung 26-02
Author
Participating institute
Institut für Programmstrukturen und Datenorganisation (IPD)
Genre
Description
- 0:00:00 Starten
- 0:01:36 How to find Security Requirements
- 0:02:08 Design Phase
- 0:04:46 Principles for Building Secure Software I
- 0:10:43 Principles for Building Secure Software II
- 0:14:28 Principles for Building Secure Software III
- 0:20:24 Further Helpful Security Patterns/Idioms
- 0:23:56 Implementation
- 0:27:58 Potenzial Security Issues
- 0:28:58 Some Testing Guidlines I
- 0:35:03 Somes Testing Guidelines II
- 0:39:06 Security Evaluation
- 0:41:28 Security Issues: Race Conditions I
- 0:45:03 Security Issues: Race Conditions II
- 0:49:59 Race Conditions Solutions
- 0:51:20 Butter Overflows
- 0:53:43 Butter Overflow Example
- 0:56:00 SQL Injection
- 0:59:24 Solution: Input Validation
- 1:04:25 Cryptography
- 1:06:40 Pseudo Randomness
- 1:12:53 Conclusion
- 1:18:16 Topic 16 Continuos Integration
- 1:18:38 Overview on Today´s Lecture
- 1:19:15 Motivation(1)
- 1:20:11 Motivation(2)
- 1:25:24 Continuous Integration - A Definition
Duration (hh:mm:ss)
01:26:45
Series
Softwaretechnik II, Vorlesung, WS 2015/2016
Published on
18.02.2016
Subject area
License
Resolution | 1280 x 720 Pixel |
Aspect ratio | 16:9 |
Audio bitrate | 127730 bps |
Audio channels | 2 |
Audio Codec | aac |
Audio Sample Rate | 48000 Hz |
Total Bitrate | 402427 bps |
Color Space | yuv420p |
Container | mov,mp4,m4a,3gp,3g2,mj2 |
Media Type | video/mp4 |
Duration | 5205 s |
Filename | DIVA-2016-182_hd.mp4 |
File Size | 4.096 byte |
Frame Rate | 25 |
Video Bitrate | 268594 bps |
Video Codec | h264 |
Embed Code
Softwaretechnik II, Vorlesung, WS 2015/2016
Episodes 1-28
of 28