[CourserHub.Com] Coursera - Secure Software Design Specialization

Torrent Details

[CourserHub.com] Coursera - Secure Software Design Specialization[CourserHub.com] Coursera - Secure Software Design Specialization

NAME
[CourserHub.com] Coursera - Secure Software Design Specialization.torrent
CATEGORY
Other
INFOHASH
2b9484dc8e1d8bd57562ca842bc37ee5bdde7bbf
SIZE
2.1 GB in 98 files
ADDED
Uploaded on 01-06-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

TO GET DIRECT DOWNLOAD LINKS OR GOOGLE DRIVE LINKS VISIT OUR WEBSITE
FOR MORE PREMIUM COURSERA COURSES VISIT: https://courserhub.com

Coursera - Secure Software Design Specialization

Secure Software Design Specialization Design and maintain secure software. Acquire the attitudes and skills needed to produce designs of secure software.

Instructors: Albert Glock
Last Update: 10/2022

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
Readme.txt51 B
software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.en.srt8.6 KB
software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.en.txt5.4 KB
software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.mp440.3 MB
software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/02_additional-resource_instructions.html1.1 KB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.en.srt10.8 KB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.en.txt6.9 KB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.mp443.7 MB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/02_additional-resource_abstraction.html7.1 KB
software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/02_additional-resource_instructions.html1.2 KB
software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.en.srt11.2 KB
software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.en.txt6.9 KB
software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.mp457.5 MB
software-design-abstraction/02_focus-on-the-users/01_user-interface-design/02_additional-resource_instructions.html1.1 KB
software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.en.srt10.7 KB
software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.en.txt6.6 KB
software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.mp447.5 MB
software-design-abstraction/02_focus-on-the-users/02_user-experience/02_additional-resource_instructions.html1.1 KB
software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.en.srt12.8 KB
software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.en.txt7.8 KB
software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.mp461.5 MB
software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/02_additional-resource_instructions.html1.2 KB
software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.en.srt8.8 KB
software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.en.txt5.4 KB
software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.mp437.8 MB
software-design-abstraction/03_what-if-there-are-no-users/02_database-design/02_additional-resource_instructions.html1.2 KB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.en.srt11.3 KB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.en.txt7.1 KB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.mp444.3 MB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/02_additional-resource_instructions.html1.3 KB
software-design-abstraction/04_advanced-database-design/01_database-design-ii/02_additional-resource_second-normal-form.htm33.9 KB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.en.srt11.9 KB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.en.txt7.4 KB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.mp456.3 MB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_DataConsiten_Norm3NF.html20.7 KB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_index.html43.9 KB
software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_instructions.html1.5 KB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.en.srt7.3 KB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.en.txt4.5 KB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.mp441.9 MB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/02_additional-resource_instructions.html1.1 KB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.en.srt3.7 KB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.en.txt2.2 KB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.mp415.7 MB
software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/02_additional-resource_instructions.html1.4 KB
software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.en.srt5.9 KB
software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.en.txt3.7 KB
software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.mp429.7 MB
software-design-abstraction/06_language-choices/01_languages-and-operating-systems/02_additional-resource_instructions.html1.1 KB
software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.en.srt11.1 KB
software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.en.txt6.8 KB
software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.mp454.6 MB
software-design-abstraction/06_language-choices/02_operating-system-selection/02_additional-resource_instructions.html1.1 KB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.en.srt8.4 KB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.en.txt5.3 KB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.mp448.3 MB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/02_additional-resource_instructions.html1.4 KB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.en.srt17.8 KB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.en.txt10.9 KB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.mp492.5 MB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/02_additional-resource_instructions.html1.2 KB
software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/03_introduction-to-secure-software-design_quiz.html7.9 KB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.en.srt17.8 KB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.en.txt11.2 KB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.mp466.8 MB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/02_additional-resource_instructions.html1.1 KB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/02_additional-resource_sdlc_overview.htm34.2 KB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.en.srt7.5 KB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.en.txt4.8 KB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.mp440.1 MB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/02_additional-resource_instructions.html1 KB
software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/03_how-design-fits_quiz.html7.7 KB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.en.srt21.3 KB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.en.txt13.2 KB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.mp499.9 MB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/02_additional-resource_instructions.html1 KB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.en.srt17.4 KB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.en.txt10.8 KB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.mp485.9 MB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/02_additional-resource_instructions.html1.2 KB
software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/03_design-in-the-context-of-different-sdlc-s_quiz.html7.7 KB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.en.srt7.8 KB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.en.txt5 KB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.mp432.7 MB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/02_additional-resource_e_dta-sw-design-high-level.php783 B
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/02_additional-resource_instructions.html1.1 KB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.en.srt14.1 KB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.en.txt8.4 KB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.mp468.1 MB
software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/02_how-high-level-design-or-architecture-handles-security-problems_quiz.html8.5 KB
software-design-development-life-cycle/05_final-exam/01_final-exam/01_assessment-1_exam.html7.8 KB
software-design-development-life-cycle/05_final-exam/01_final-exam/02_assessment-2_exam.html7.5 KB
software-design-development-life-cycle/05_final-exam/01_final-exam/03_assessment-3_exam.html8.2 KB
software-design-development-life-cycle/05_final-exam/01_final-exam/04_assessment-4_exam.html7.7 KB
software-design-development-life-cycle/05_final-exam/01_final-exam/05_assessment-5_exam.html8.2 KB
software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.en.srt4.5 KB
software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.en.txt2.7 KB
software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.mp422.9 MB

Alternative Torrents for 'CourserHub.com Coursera Secure Software Design Specialization'.

There are no alternative torrents found.