KIT-Bibliothek

Softwaretechnik II, WS 2015/2016, gehalten am 08.02.2016, Vorlesung 26-02

This audio or video file is copyrighted. Access is only allowed via computers of the Karlsruhe Institute of Technology (KIT).

Author

Anne Koziolek

Participating institute

Institut für Programmstrukturen und Datenorganisation (IPD)

Genre

Vorlesung

Description

  • 0:00:00 Starten
  • 0:01:36 How to find Security Requirements
  • 0:02:08 Design Phase
  • 0:04:46 Principles for Building Secure Software I
  • 0:10:43 Principles for Building Secure Software II
  • 0:14:28 Principles for Building Secure Software III
  • 0:20:24 Further Helpful Security Patterns/Idioms
  • 0:23:56 Implementation
  • 0:27:58 Potenzial Security Issues
  • 0:28:58 Some Testing Guidlines I
  • 0:35:03 Somes Testing Guidelines II
  • 0:39:06 Security Evaluation
  • 0:41:28 Security Issues: Race Conditions I
  • 0:45:03 Security Issues: Race Conditions II
  • 0:49:59 Race Conditions Solutions
  • 0:51:20 Butter Overflows
  • 0:53:43 Butter Overflow Example
  • 0:56:00 SQL Injection
  • 0:59:24 Solution: Input Validation
  • 1:04:25 Cryptography
  • 1:06:40 Pseudo Randomness
  • 1:12:53 Conclusion
  • 1:18:16 Topic 16 Continuos Integration
  • 1:18:38 Overview on Today´s Lecture
  • 1:19:15 Motivation(1)
  • 1:20:11 Motivation(2)
  • 1:25:24 Continuous Integration - A Definition

Duration (hh:mm:ss)

01:26:45

Series

Softwaretechnik II, Vorlesung, WS 2015/2016

Published on

18.02.2016

Subject area

Computer science

License

KITopen Licence

Resolution 1280 x 720 Pixel
Aspect ratio 16:9
Audio bitrate 127730 bps
Audio channels 2
Audio Codec aac
Audio Sample Rate 48000 Hz
Total Bitrate 402427 bps
Color Space yuv420p
Container mov,mp4,m4a,3gp,3g2,mj2
Media Type video/mp4
Duration 5205 s
Filename DIVA-2016-182_hd.mp4
File Size 4.096 byte
Frame Rate 25
Video Bitrate 268594 bps
Video Codec h264

Embed Code

Softwaretechnik II, Vorlesung, WS 2015/2016 Episodes 1-28 of 28