elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Last modified Size
Parent Directory -
D8.9-Attacks on Software Security hide01.ir.ts 2026-05-11 17:20 34M
D8.8-SQL Injection Demo hide01.ir.ts 2026-05-11 17:20 20M
D8.7-Techniques to Secure Software Development hide01.ir.ts 2026-05-11 17:20 50M
D8.6-Software or Systems Development Life Cycle Part 2 hide01.ir.ts 2026-05-11 17:20 57M
D8.5-Software or Systems Development Life Cycle Part 1 hide01.ir.ts 2026-05-11 17:20 55M
D8.4-Systems Development Life Cycle hide01.ir.ts 2026-05-11 17:20 35M
D8.3-Why We Need Software Development Security hide01.ir.ts 2026-05-11 17:20 56M
D8.26-PQ-Database Inference hide01.ir.ts 2026-05-11 17:20 25M
D8.25-CICD - Part 4 hide01.ir.ts 2026-05-11 17:20 25M
D8.24-CICD - Part 3 hide01.ir.ts 2026-05-11 17:20 52M
D8.23-CICD - Part 2 hide01.ir.ts 2026-05-11 17:20 88M
D8.22-CICD - Part 1 hide01.ir.ts 2026-05-11 17:20 85M
D8.21-PQ-Fast Code Release 1 hide01.ir.ts 2026-05-11 17:20 3.6M
D8.20-AppSec Considerations - Deployment Phase hide01.ir.ts 2026-05-11 17:20 43M
D8.2-Covert Storage and Timing Channels hide01.ir.ts 2026-05-11 17:20 74M
D8.19-AppSec Considerations - Testing Phase hide01.ir.ts 2026-05-11 17:20 37M
D8.18-AppSec Considerations - Development Phase hide01.ir.ts 2026-05-11 17:20 122M
D8.17-AppSec Considerations - Design Phase hide01.ir.ts 2026-05-11 17:20 45M
D8.16-AppSec Considerations - Requirements Phase hide01.ir.ts 2026-05-11 17:20 124M
D8.15-CMMI hide01.ir.ts 2026-05-11 17:20 63M
D8.14-Testing the Security of Software hide01.ir.ts 2026-05-11 17:19 25M
D8.13-Security of APIs hide01.ir.ts 2026-05-11 17:19 153M
D8.12-PQ-Most, Risk hide01.ir.ts 2026-05-11 17:19 61M
D8.11-Why We Need SDLC & How To Secure It Part 2 hide01.ir.ts 2026-05-11 17:19 63M
D8.10-Why We Need SDLC & How To Secure It Part 1 hide01.ir.ts 2026-05-11 17:19 47M
D8.1-Introduction hide01.ir.ts 2026-05-11 17:19 1.3M