Udemy - Software Architecture and Clean Code Design in OOP (11.2024)
File List
- 10. ===== Exam MVC & Layered Architecture =====/02. Solution Overview Part 1.mp4 328.6 MB
- 16. REST Architecture/03. RESTful Service Implementation with Spring MVC.mp4 322.6 MB
- 12. Secure Software Architecture and Secure Coding/02. Broken Access Control.mp4 316.8 MB
- 13. Logging in Java/02. Logging in Java Part 2 (Log4J, Logback, SLF4J).mp4 297.0 MB
- 19. Structural Diagrams/01. Class Diagram.mp4 274.1 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/10. Zero Trust Architecture and Modern Authentication.mp4 256.8 MB
- 12. Secure Software Architecture and Secure Coding/24. Broken Authentication - P.3 - (Practice, JWT Tokens, Timing Attacks).mp4 253.3 MB
- 05. GoF Design Patterns of Software Architecture in OOP/06. Behevioral Patterns, p.2.mp4 246.8 MB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/05. Development Metrics & KPIs Tech Debt Ratio & Index, Cyclomatic Complexity.mp4 243.8 MB
- 13. Logging in Java/01. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).mp4 243.4 MB
- 05. GoF Design Patterns of Software Architecture in OOP/02. Creational Patterns.mp4 236.8 MB
- 05. GoF Design Patterns of Software Architecture in OOP/05. Behevioral Patterns, p.1.mp4 236.6 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/09. Locking Down Access Implementing Robust Authorization Mechanisms.mp4 236.3 MB
- 07. Databases Architecture from Scratch/06. Create Schema & Table Naming, Collation, Engines, Types, Column Properties.mp4 235.5 MB
- 12. Secure Software Architecture and Secure Coding/36. Improper Inventory Management - Part 1.mp4 233.6 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/08. Securing Sessions Preventing Hijacking and Improving Stability.mp4 233.1 MB
- 12. Secure Software Architecture and Secure Coding/27. Unrestricted Resource Consumption - Part 1.mp4 227.8 MB
- 11. Connection Pooling/01. Connection Pooling DBCP, C3P0, HikariCP & Tomcat Connection Pool with JNDI.mp4 220.3 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/03. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.mp4 219.7 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/15. Safe File Handling Preventing File-Based Vulnerabilities.mp4 215.9 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/19. Mobile Application Security.mp4 214.7 MB
- 12. Secure Software Architecture and Secure Coding/32. Unrestricted Access to Sensitive Business Flows - Part 2.mp4 212.9 MB
- 22. Tools, Automation, and Industry Best Practices/04. PMD Static Code Analysis.mp4 206.9 MB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/10. Development Metrics & KPIs Rules Compliance Index (RCI) & Violations.mp4 204.4 MB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/11. Development Metrics & KPIs Integration Test Coverage & End-to-End Test Coverage.mp4 203.6 MB
- 10. ===== Exam MVC & Layered Architecture =====/01. Task Overview.mp4 202.8 MB
- 10. ===== Exam MVC & Layered Architecture =====/03. Solution Overview Part 2.mp4 201.1 MB
- 23. Advanced Code Review Strategies/01. Code Review Guidelines & Contribution Policy.mp4 200.1 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/17. Hardening System Configurations Reducing Attack Surface.mp4 199.9 MB
- 12. Secure Software Architecture and Secure Coding/21. Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).mp4 199.4 MB
- 12. Secure Software Architecture and Secure Coding/23. Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).mp4 198.9 MB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/08. Development Metrics & KPIs Duplicate Code & Commented Code Index.mp4 194.3 MB
- 12. Secure Software Architecture and Secure Coding/14. Identification & Authentication Failures.mp4 192.1 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/12. Encryption Essentials Protecting Data with Cryptography - Part 2.mp4 189.9 MB
- 05. GoF Design Patterns of Software Architecture in OOP/07. Behevioral Patterns, p.3.mp4 189.0 MB
- 09. ===== Exam DAO, Database, JDBC, SQL ======/01. Exam task review and solution.mp4 188.3 MB
- 05. GoF Design Patterns of Software Architecture in OOP/03. Structural Patterns, p.1.mp4 188.0 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/13. Defending Data Strategies for Protecting Sensitive Information.mp4 186.2 MB
- 23. Advanced Code Review Strategies/02. Coding Standards, Code Quality & Consistency.mp4 185.0 MB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/04. KISS Principle in OOP.mp4 184.8 MB
- 12. Secure Software Architecture and Secure Coding/31. Unrestricted Access to Sensitive Business Flows - Part 1.mp4 181.1 MB
- 12. Secure Software Architecture and Secure Coding/13. Vulnerable & Outdated Components.mp4 180.9 MB
- 18. Behavioral Diagrams/02. Sequence Diagram.mp4 180.5 MB
- 19. Structural Diagrams/06. Composite Structure Diagram.mp4 179.2 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/14. Securing Databases Best Practices for Preventing SQL Injection.mp4 176.0 MB
- 12. Secure Software Architecture and Secure Coding/12. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4 175.1 MB
- 22. Tools, Automation, and Industry Best Practices/01. Tools for Code Review and Code Analysis.mp4 174.6 MB
- 07. Databases Architecture from Scratch/10. Database Normalization & Denormalization.mp4 174.2 MB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/09. Development Metrics & KPIs Code Review Feedback Loop Time & Code Reviews.mp4 173.2 MB
- 19. Structural Diagrams/03. Component Diagram.mp4 171.6 MB
- 21. Code Review Fundamentals/02. Basics of Code Review Process.mp4 169.0 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/02. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.mp4 168.2 MB
- 05. GoF Design Patterns of Software Architecture in OOP/04. Structural Patterns, p.2.mp4 165.6 MB
- 19. Structural Diagrams/05. Deployment Diagram.mp4 165.3 MB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/05. YAGNI Principle in OOP.mp4 165.1 MB
- 12. Secure Software Architecture and Secure Coding/25. Broken Object Property Level Authorization - Part 1.mp4 164.4 MB
- 18. Behavioral Diagrams/01. Use Case Diagram.mp4 163.4 MB
- 18. Behavioral Diagrams/03. Activity Diagram.mp4 159.4 MB
- 12. Secure Software Architecture and Secure Coding/26. Broken Object Property Level Authorization - Part 2 (Practice).mp4 157.6 MB
- 12. Secure Software Architecture and Secure Coding/29. Broken Function Level Authorization - Part 1.mp4 156.2 MB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/02. Metric, KPI & OKR.mp4 155.3 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/16. Protecting Communication Channels Ensuring Secure Transmission of Data.mp4 154.6 MB
- 19. Structural Diagrams/07. Profile Diagram.mp4 154.3 MB
- 07. Databases Architecture from Scratch/08. Referential Integrity Foreign Key Constraint & Cascading Operations.mp4 154.0 MB
- 12. Secure Software Architecture and Secure Coding/19. Broken Object Level Authorization - Part 1.mp4 151.9 MB
- 18. Behavioral Diagrams/06. Timing Diagram.mp4 150.6 MB
- 10. ===== Exam MVC & Layered Architecture =====/04. Solution Overview Part 3.mp4 149.7 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/11. Encryption Essentials Protecting Data with Cryptography - Part 1.mp4 148.3 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/05. Securing Inputs How to Validate and Sanitize Input Data.mp4 146.7 MB
- 18. Behavioral Diagrams/07. Interaction Overview Diagram.mp4 146.0 MB
- 12. Secure Software Architecture and Secure Coding/38. Unsafe Consumption of APIs - Part 1.mp4 141.5 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/04. General Security Tips Writing Code with Safety in Mind.mp4 139.1 MB
- 12. Secure Software Architecture and Secure Coding/05. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4 138.5 MB
- 23. Advanced Code Review Strategies/03. Provide Feedback like a Pro.mp4 138.1 MB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/06. DRY Principle in OOP Part 1.mp4 137.4 MB
- 08. Web Application Design Patterns/01. DAO (Data Access Object) Design Pattern.mp4 137.1 MB
- 07. Databases Architecture from Scratch/05. Relational Databases Basic Concepts.mp4 134.4 MB
- 18. Behavioral Diagrams/05. Communication Diagram (formerly known as Collaboration Diagram).mp4 133.3 MB
- 12. Secure Software Architecture and Secure Coding/16. Security Logging & Monitoring Failures.mp4 125.5 MB
- 19. Structural Diagrams/02. Object Diagram.mp4 123.9 MB
- 21. Code Review Fundamentals/01. Introduction to Code Reviews.mp4 123.8 MB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/09. Packaging Pricniples p.2 Coupling Principles and Others.mp4 121.1 MB
- 07. Databases Architecture from Scratch/02. Databases Overview - Part 1.mp4 120.4 MB
- 08. Web Application Design Patterns/03. Layered Architecture.mp4 120.2 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/07. Mastering Authentication Best Practices for Managing User Credentials.mp4 120.1 MB
- 22. Tools, Automation, and Industry Best Practices/02. Part 1 - Checkstyle Adhering Coding Standards.mp4 120.0 MB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/06. Development Metrics & KPIs Unit Test Related Metrics - Part 1.mp4 119.8 MB
- 07. Databases Architecture from Scratch/04. MySQL Overview & Installation (including Workbench Installation).mp4 114.9 MB
- 12. Secure Software Architecture and Secure Coding/17. Server-Side Request Forgery (SSRF).mp4 114.8 MB
- 07. Databases Architecture from Scratch/07. Database Modelling & Design Conceptual, Logical and Physical Data Models.mp4 114.4 MB
- 12. Secure Software Architecture and Secure Coding/01. OWASP Top 10 Overview.mp4 111.7 MB
- 23. Advanced Code Review Strategies/05. Scalability Principles in Code.mp4 109.6 MB
- 07. Databases Architecture from Scratch/03. Databases Overview - Part 2.mp4 109.4 MB
- 07. Databases Architecture from Scratch/09. Indexes in Databases.mp4 106.9 MB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/07. DRY Principle in OOP Part 2 - Practice.mp4 100.9 MB
- 12. Secure Software Architecture and Secure Coding/06. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4 100.5 MB
- 12. Secure Software Architecture and Secure Coding/04. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4 99.8 MB
- 06. TDD, BDD & ATTD/01. Test-driven development Theory.mp4 99.3 MB
- 12. Secure Software Architecture and Secure Coding/15. Software & Data Integrity Failures.mp4 99.0 MB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/02. Tell, Don’t Ask Pricniple & Data Structures.mp4 96.1 MB
- 12. Secure Software Architecture and Secure Coding/28. Unrestricted Resource Consumption - Part 2 (Practice).mp4 96.1 MB
- 12. Secure Software Architecture and Secure Coding/09. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4 94.9 MB
- 19. Structural Diagrams/04. Package Diagram.mp4 93.9 MB
- 12. Secure Software Architecture and Secure Coding/11. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4 92.9 MB
- 12. Secure Software Architecture and Secure Coding/07. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4 91.8 MB
- 17. UML Introduction/01. Introduction to UML.mp4 87.3 MB
- 16. REST Architecture/01. REST Architecture Overview and Key Principles.mp4 87.1 MB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/01. Clean Code Architecture, Coupling & Cohesion.mp4 87.0 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/18. Cloud Security Best Practices.mp4 86.0 MB
- 12. Secure Software Architecture and Secure Coding/03. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4 85.8 MB
- 12. Secure Software Architecture and Secure Coding/37. Improper Inventory Management - Part 2 (Practice).mp4 85.7 MB
- 12. Secure Software Architecture and Secure Coding/33. Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).mp4 84.5 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/06. Safeguarding Outputs Effective Encoding for Secure Systems.mp4 81.9 MB
- 12. Secure Software Architecture and Secure Coding/08. Injection (XPath Injection, Log Injection, Input Validation).mp4 73.8 MB
- 08. Web Application Design Patterns/02. MVC Design Pattern.mp4 73.3 MB
- 12. Secure Software Architecture and Secure Coding/39. Unsafe Consumption of APIs - Part 2 (Practice).mp4 73.1 MB
- 06. TDD, BDD & ATTD/03. TDD, BDD & ATTD - Practice.mp4 72.6 MB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/08. Packaging Pricniples p.1 Cohesion Principles.mp4 72.5 MB
- 12. Secure Software Architecture and Secure Coding/30. Broken Function Level Authorization - Part 2 (Practice).mp4 69.7 MB
- 12. Secure Software Architecture and Secure Coding/22. Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).mp4 67.9 MB
- 06. TDD, BDD & ATTD/02. BDD & ATTD.mp4 65.5 MB
- 18. Behavioral Diagrams/04. State Machine Diagram.mp4 64.1 MB
- 22. Tools, Automation, and Industry Best Practices/03. Part 2 - Checkstyle Adhering Coding Standards.mp4 63.6 MB
- 16. REST Architecture/05. API Testing with Postman.mp4 63.0 MB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/07. Development Metrics & KPIs Unit Test Related Metrics - Part 2.mp4 62.5 MB
- 12. Secure Software Architecture and Secure Coding/20. Broken Object Level Authorization - Part 2 (Practice).mp4 61.7 MB
- 16. REST Architecture/04. Review of tools for API testing & Postman Installation.mp4 61.4 MB
- 02. SOLID Principles/02. Open Closed Principle.mp4 60.0 MB
- 02. SOLID Principles/01. SOLID principles overview & Single Responsibility Principle.mp4 59.4 MB
- 14. Cybersecurity Comprehensive Security Practices for Developers/01. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.mp4 57.6 MB
- 05. GoF Design Patterns of Software Architecture in OOP/01. GoF Patterns Overview.mp4 55.0 MB
- 12. Secure Software Architecture and Secure Coding/10. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4 52.5 MB
- 02. SOLID Principles/05. Dependency Inversion Principle.mp4 51.8 MB
- 23. Advanced Code Review Strategies/04. Security Considerations During Code Review.mp4 49.5 MB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/04. Introduction to Engineering Excellence Metrics & KPIs.mp4 46.5 MB
- 02. SOLID Principles/03. Liskov Substitution Principle.mp4 42.2 MB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/03. Law of Demeter.mp4 40.5 MB
- 16. REST Architecture/02. Naming Convention for RESTful Services.mp4 36.4 MB
- 02. SOLID Principles/04. Interface Segregation Principle.mp4 34.7 MB
- 01. Introduction/01. Communication plan.mp4 11.7 MB
- 24. Bonus section/01. Bonus lesson.mp4 11.0 MB
- 01. Introduction/02. Unlimited access to 'Learn IT' application for students.mp4 7.6 MB
- 07. Databases Architecture from Scratch/06. Create Schema & Table Naming, Collation, Engines, Types, Column Properties.vtt 41.1 KB
- 19. Structural Diagrams/01. Class Diagram.vtt 39.8 KB
- 05. GoF Design Patterns of Software Architecture in OOP/05. Behevioral Patterns, p.1.vtt 38.5 KB
- 05. GoF Design Patterns of Software Architecture in OOP/06. Behevioral Patterns, p.2.vtt 38.5 KB
- 05. GoF Design Patterns of Software Architecture in OOP/02. Creational Patterns.vtt 38.1 KB
- 12. Secure Software Architecture and Secure Coding/02. Broken Access Control.vtt 37.8 KB
- 05. GoF Design Patterns of Software Architecture in OOP/03. Structural Patterns, p.1.vtt 36.4 KB
- 07. Databases Architecture from Scratch/10. Database Normalization & Denormalization.vtt 35.8 KB
- 12. Secure Software Architecture and Secure Coding/38. Unsafe Consumption of APIs - Part 1.vtt 34.3 KB
- 12. Secure Software Architecture and Secure Coding/14. Identification & Authentication Failures.vtt 33.0 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/09. Packaging Pricniples p.2 Coupling Principles and Others.vtt 31.4 KB
- 13. Logging in Java/02. Logging in Java Part 2 (Log4J, Logback, SLF4J).vtt 30.8 KB
- 13. Logging in Java/01. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).vtt 30.7 KB
- 12. Secure Software Architecture and Secure Coding/27. Unrestricted Resource Consumption - Part 1.vtt 30.6 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/08. Packaging Pricniples p.1 Cohesion Principles.vtt 30.1 KB
- 12. Secure Software Architecture and Secure Coding/24. Broken Authentication - P.3 - (Practice, JWT Tokens, Timing Attacks).vtt 30.0 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/07. Mastering Authentication Best Practices for Managing User Credentials.vtt 30.0 KB
- 12. Secure Software Architecture and Secure Coding/36. Improper Inventory Management - Part 1.vtt 30.0 KB
- 07. Databases Architecture from Scratch/05. Relational Databases Basic Concepts.vtt 29.9 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/04. KISS Principle in OOP.vtt 29.8 KB
- 11. Connection Pooling/01. Connection Pooling DBCP, C3P0, HikariCP & Tomcat Connection Pool with JNDI.vtt 29.8 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/05. Development Metrics & KPIs Tech Debt Ratio & Index, Cyclomatic Complexity.vtt 29.5 KB
- 06. TDD, BDD & ATTD/01. Test-driven development Theory.vtt 29.3 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/09. Locking Down Access Implementing Robust Authorization Mechanisms.vtt 29.2 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/10. Development Metrics & KPIs Rules Compliance Index (RCI) & Violations.vtt 29.1 KB
- 12. Secure Software Architecture and Secure Coding/32. Unrestricted Access to Sensitive Business Flows - Part 2.vtt 29.0 KB
- 23. Advanced Code Review Strategies/02. Coding Standards, Code Quality & Consistency.vtt 28.7 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/10. Zero Trust Architecture and Modern Authentication.vtt 28.6 KB
- 23. Advanced Code Review Strategies/01. Code Review Guidelines & Contribution Policy.vtt 28.4 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/19. Mobile Application Security.vtt 28.4 KB
- 07. Databases Architecture from Scratch/02. Databases Overview - Part 1.vtt 28.2 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/15. Safe File Handling Preventing File-Based Vulnerabilities.vtt 28.1 KB
- 08. Web Application Design Patterns/03. Layered Architecture.vtt 28.0 KB
- 07. Databases Architecture from Scratch/07. Database Modelling & Design Conceptual, Logical and Physical Data Models.vtt 27.8 KB
- 21. Code Review Fundamentals/02. Basics of Code Review Process.vtt 27.7 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/05. YAGNI Principle in OOP.vtt 27.7 KB
- 10. ===== Exam MVC & Layered Architecture =====/02. Solution Overview Part 1.vtt 27.7 KB
- 18. Behavioral Diagrams/04. State Machine Diagram.vtt 27.2 KB
- 12. Secure Software Architecture and Secure Coding/12. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).vtt 27.2 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/11. Development Metrics & KPIs Integration Test Coverage & End-to-End Test Coverage.vtt 27.2 KB
- 19. Structural Diagrams/03. Component Diagram.vtt 27.1 KB
- 18. Behavioral Diagrams/01. Use Case Diagram.vtt 27.0 KB
- 22. Tools, Automation, and Industry Best Practices/01. Tools for Code Review and Code Analysis.vtt 26.9 KB
- 19. Structural Diagrams/06. Composite Structure Diagram.vtt 26.7 KB
- 18. Behavioral Diagrams/02. Sequence Diagram.vtt 26.7 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/03. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.vtt 26.5 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/08. Securing Sessions Preventing Hijacking and Improving Stability.vtt 26.4 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/18. Cloud Security Best Practices.vtt 26.3 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/01. Clean Code Architecture, Coupling & Cohesion.vtt 26.0 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/17. Hardening System Configurations Reducing Attack Surface.vtt 25.9 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/08. Development Metrics & KPIs Duplicate Code & Commented Code Index.vtt 25.9 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/09. Development Metrics & KPIs Code Review Feedback Loop Time & Code Reviews.vtt 25.9 KB
- 07. Databases Architecture from Scratch/09. Indexes in Databases.vtt 25.7 KB
- 07. Databases Architecture from Scratch/03. Databases Overview - Part 2.vtt 25.6 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/02. Metric, KPI & OKR.vtt 25.5 KB
- 17. UML Introduction/01. Introduction to UML.vtt 25.5 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/02. Tell, Don’t Ask Pricniple & Data Structures.vtt 25.5 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/14. Securing Databases Best Practices for Preventing SQL Injection.vtt 25.4 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/13. Defending Data Strategies for Protecting Sensitive Information.vtt 25.1 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/07. Development Metrics & KPIs Unit Test Related Metrics - Part 2.vtt 25.1 KB
- 05. GoF Design Patterns of Software Architecture in OOP/04. Structural Patterns, p.2.vtt 24.9 KB
- 05. GoF Design Patterns of Software Architecture in OOP/07. Behevioral Patterns, p.3.vtt 24.8 KB
- 22. Tools, Automation, and Industry Best Practices/04. PMD Static Code Analysis.vtt 24.8 KB
- 16. REST Architecture/03. RESTful Service Implementation with Spring MVC.vtt 24.8 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/05. Securing Inputs How to Validate and Sanitize Input Data.vtt 24.7 KB
- 18. Behavioral Diagrams/03. Activity Diagram.vtt 24.7 KB
- 19. Structural Diagrams/04. Package Diagram.vtt 24.3 KB
- 10. ===== Exam MVC & Layered Architecture =====/01. Task Overview.vtt 24.2 KB
- 12. Secure Software Architecture and Secure Coding/10. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).vtt 24.0 KB
- 18. Behavioral Diagrams/06. Timing Diagram.vtt 23.9 KB
- 07. Databases Architecture from Scratch/04. MySQL Overview & Installation (including Workbench Installation).vtt 23.8 KB
- 19. Structural Diagrams/07. Profile Diagram.vtt 23.8 KB
- 12. Secure Software Architecture and Secure Coding/13. Vulnerable & Outdated Components.vtt 23.4 KB
- 16. REST Architecture/05. API Testing with Postman.vtt 23.3 KB
- 12. Secure Software Architecture and Secure Coding/21. Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).vtt 23.2 KB
- 12. Secure Software Architecture and Secure Coding/31. Unrestricted Access to Sensitive Business Flows - Part 1.vtt 23.2 KB
- 12. Secure Software Architecture and Secure Coding/25. Broken Object Property Level Authorization - Part 1.vtt 23.2 KB
- 07. Databases Architecture from Scratch/08. Referential Integrity Foreign Key Constraint & Cascading Operations.vtt 23.2 KB
- 12. Secure Software Architecture and Secure Coding/17. Server-Side Request Forgery (SSRF).vtt 23.1 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/16. Protecting Communication Channels Ensuring Secure Transmission of Data.vtt 22.6 KB
- 19. Structural Diagrams/05. Deployment Diagram.vtt 22.5 KB
- 18. Behavioral Diagrams/07. Interaction Overview Diagram.vtt 22.4 KB
- 12. Secure Software Architecture and Secure Coding/16. Security Logging & Monitoring Failures.vtt 22.3 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/02. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.vtt 22.3 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/12. Encryption Essentials Protecting Data with Cryptography - Part 2.vtt 22.0 KB
- 16. REST Architecture/01. REST Architecture Overview and Key Principles.vtt 22.0 KB
- 23. Advanced Code Review Strategies/03. Provide Feedback like a Pro.vtt 22.0 KB
- 12. Secure Software Architecture and Secure Coding/23. Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).vtt 21.9 KB
- 12. Secure Software Architecture and Secure Coding/29. Broken Function Level Authorization - Part 1.vtt 21.5 KB
- 18. Behavioral Diagrams/05. Communication Diagram (formerly known as Collaboration Diagram).vtt 21.2 KB
- 09. ===== Exam DAO, Database, JDBC, SQL ======/01. Exam task review and solution.vtt 20.9 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/11. Encryption Essentials Protecting Data with Cryptography - Part 1.vtt 20.9 KB
- 08. Web Application Design Patterns/01. DAO (Data Access Object) Design Pattern.vtt 20.5 KB
- 12. Secure Software Architecture and Secure Coding/09. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).vtt 20.5 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/06. DRY Principle in OOP Part 1.vtt 20.3 KB
- 12. Secure Software Architecture and Secure Coding/04. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).vtt 20.2 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/04. General Security Tips Writing Code with Safety in Mind.vtt 20.0 KB
- 06. TDD, BDD & ATTD/02. BDD & ATTD.vtt 20.0 KB
- 12. Secure Software Architecture and Secure Coding/22. Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).vtt 19.6 KB
- 12. Secure Software Architecture and Secure Coding/11. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).vtt 19.6 KB
- 12. Secure Software Architecture and Secure Coding/01. OWASP Top 10 Overview.vtt 19.4 KB
- 10. ===== Exam MVC & Layered Architecture =====/03. Solution Overview Part 2.vtt 19.0 KB
- 12. Secure Software Architecture and Secure Coding/05. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).vtt 18.7 KB
- 19. Structural Diagrams/02. Object Diagram.vtt 18.6 KB
- 23. Advanced Code Review Strategies/04. Security Considerations During Code Review.vtt 18.5 KB
- 16. REST Architecture/02. Naming Convention for RESTful Services.vtt 18.4 KB
- 12. Secure Software Architecture and Secure Coding/26. Broken Object Property Level Authorization - Part 2 (Practice).vtt 18.3 KB
- 06. TDD, BDD & ATTD/03. TDD, BDD & ATTD - Practice.vtt 18.0 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/06. Development Metrics & KPIs Unit Test Related Metrics - Part 1.vtt 17.4 KB
- 22. Tools, Automation, and Industry Best Practices/02. Part 1 - Checkstyle Adhering Coding Standards.vtt 17.0 KB
- 12. Secure Software Architecture and Secure Coding/19. Broken Object Level Authorization - Part 1.vtt 17.0 KB
- 05. GoF Design Patterns of Software Architecture in OOP/01. GoF Patterns Overview.vtt 17.0 KB
- 12. Secure Software Architecture and Secure Coding/15. Software & Data Integrity Failures.vtt 16.9 KB
- 12. Secure Software Architecture and Secure Coding/06. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).vtt 16.5 KB
- 12. Secure Software Architecture and Secure Coding/07. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).vtt 16.4 KB
- 22. Tools, Automation, and Industry Best Practices/03. Part 2 - Checkstyle Adhering Coding Standards.vtt 16.3 KB
- 08. Web Application Design Patterns/02. MVC Design Pattern.vtt 16.3 KB
- 23. Advanced Code Review Strategies/05. Scalability Principles in Code.vtt 16.2 KB
- 12. Secure Software Architecture and Secure Coding/08. Injection (XPath Injection, Log Injection, Input Validation).vtt 16.0 KB
- 21. Code Review Fundamentals/01. Introduction to Code Reviews.vtt 15.4 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/06. Safeguarding Outputs Effective Encoding for Secure Systems.vtt 15.2 KB
- 16. REST Architecture/04. Review of tools for API testing & Postman Installation.vtt 14.8 KB
- 12. Secure Software Architecture and Secure Coding/03. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).vtt 13.5 KB
- 12. Secure Software Architecture and Secure Coding/37. Improper Inventory Management - Part 2 (Practice).vtt 13.3 KB
- 12. Secure Software Architecture and Secure Coding/20. Broken Object Level Authorization - Part 2 (Practice).vtt 13.1 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/07. DRY Principle in OOP Part 2 - Practice.vtt 12.7 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/03. Law of Demeter.vtt 12.2 KB
- 03 - PRACTICE Coding exercises to practice SOLID principles/001 Single Responsibility Principle User Registration and Authentication Refactoring Exercise.html 11.8 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/001 Single Responsibility Principle User Registration and Authentication Refactoring Exercise.html 11.8 KB
- 12. Secure Software Architecture and Secure Coding/33. Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).vtt 11.5 KB
- 03 - PRACTICE Coding exercises to practice SOLID principles/002 Open Closed Principle Shape Refactoring Challenge.html 11.2 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/002 Open Closed Principle Shape Refactoring Challenge.html 11.2 KB
- 12. Secure Software Architecture and Secure Coding/28. Unrestricted Resource Consumption - Part 2 (Practice).vtt 11.1 KB
- 10. ===== Exam MVC & Layered Architecture =====/04. Solution Overview Part 3.vtt 11.1 KB
- 12. Secure Software Architecture and Secure Coding/39. Unsafe Consumption of APIs - Part 2 (Practice).vtt 10.7 KB
- 03 - PRACTICE Coding exercises to practice SOLID principles/004 Interface Segregation Principle Worker Refactoring Challenge.html 10.3 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/004 Interface Segregation Principle Worker Refactoring Challenge.html 10.3 KB
- 12. Secure Software Architecture and Secure Coding/30. Broken Function Level Authorization - Part 2 (Practice).vtt 9.6 KB
- 14. Cybersecurity Comprehensive Security Practices for Developers/01. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.vtt 9.5 KB
- 03 - PRACTICE Coding exercises to practice SOLID principles/003 Liskov Substitution Principle Square and Rectangle Refactoring Challenge.html 9.4 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/003 Liskov Substitution Principle Square and Rectangle Refactoring Challenge.html 9.4 KB
- 02. SOLID Principles/02. Open Closed Principle.vtt 9.4 KB
- 02. SOLID Principles/01. SOLID principles overview & Single Responsibility Principle.vtt 9.1 KB
- 12. Secure Software Architecture and Secure Coding/18. OWASP API Security Project & OWASP API Security Top 10 2023.html 8.9 KB
- 03 - PRACTICE Coding exercises to practice SOLID principles/005 Dependency Inversion Principle Car-Engine Refactoring Challenge.html 8.5 KB
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/005 Dependency Inversion Principle Car-Engine Refactoring Challenge.html 8.5 KB
- 15. ===== EXAM TASK OWASP Top 10, Secure Coding & Logging =====/01. Exam Task Description and Solution (with reference to the source code).html 7.2 KB
- 02. SOLID Principles/05. Dependency Inversion Principle.vtt 7.1 KB
- 02. SOLID Principles/03. Liskov Substitution Principle.vtt 6.1 KB
- 12. Secure Software Architecture and Secure Coding/34. Server Side Request Forgery - SSRF (OWASP 2023 Updates).html 6.0 KB
- 02. SOLID Principles/04. Interface Segregation Principle.vtt 5.8 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/04. Introduction to Engineering Excellence Metrics & KPIs.vtt 5.6 KB
- 01. Introduction/01. Communication plan.vtt 5.5 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/03. RAG Status to Present KPI.html 4.3 KB
- 01. Introduction/02. Unlimited access to 'Learn IT' application for students.vtt 4.1 KB
- 12. Secure Software Architecture and Secure Coding/35. Security Misconfiguration (OWASP 2023 Updates).html 3.9 KB
- 24. Bonus section/01. Bonus lesson.vtt 3.7 KB
- 20. Metrics & KPIs to Monitor and Control Software Development Process/01. Why this section is in this course and why it is important.html 2.7 KB
- 01. Introduction/03. Tips to Improve Your Course Taking Experience.html 1.9 KB
- 07. Databases Architecture from Scratch/01. About this section.html 785 bytes
- 08. Web Application Design Patterns/external-links/02. Source-code-of-Model.url 215 bytes
- 08. Web Application Design Patterns/external-links/02. Source-code-of-Controller.url 197 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/06. Source-code-examples-from-the-lesson.url 184 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/07. Source-code-examples-from-the-lesson.url 184 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/08. Source-code-examples-from-the-lesson.url 184 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/26. Source-code-examples-from-the-lesson.url 180 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/33. Source-code-examples-from-the-lesson.url 180 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/30. Source-code-examples-from-the-lesson.url 179 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/02. Source-code-examples-from-the-lesson.url 178 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/28. Source-code-examples-from-the-lesson.url 178 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/37. Source-code-examples-from-the-lesson.url 178 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/39. Source-code-examples-from-the-lesson.url 178 bytes
- 13. Logging in Java/external-links/01. Source-code-examples-from-the-lesson.url 178 bytes
- 13. Logging in Java/external-links/02. Source-code-examples-from-the-lesson.url 178 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/04. Source-code-examples-from-the-lesson.url 177 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/05. Source-code-examples-from-the-lesson.url 177 bytes
- 08. Web Application Design Patterns/external-links/02. Source-code-of-View.url 168 bytes
- 05. GoF Design Patterns of Software Architecture in OOP/external-links/02. Source-code-of-all-examples-from-the-lesson.url 142 bytes
- 05. GoF Design Patterns of Software Architecture in OOP/external-links/04. Source-code-of-all-examples-from-the-lesson.url 142 bytes
- 05. GoF Design Patterns of Software Architecture in OOP/external-links/05. Source-code-of-all-examples-from-the-lesson.url 142 bytes
- 05. GoF Design Patterns of Software Architecture in OOP/external-links/06. Source-code-of-all-examples-from-the-lesson.url 142 bytes
- 05. GoF Design Patterns of Software Architecture in OOP/external-links/07. Source-code-of-all-examples-from-the-lesson.url 142 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/20. Source-code-examples-from-the-lesson.url 137 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/24. Source-code-examples-from-the-lesson.url 137 bytes
- 02. SOLID Principles/external-links/01. Source-code-All-examples-from-the-lecture.url 134 bytes
- 02. SOLID Principles/external-links/02. Source-code-All-examples-from-the-lecture.url 134 bytes
- 02. SOLID Principles/external-links/03. Source-code-All-examples-from-the-lecture.url 134 bytes
- 02. SOLID Principles/external-links/04. Source-code-All-examples-from-the-lecture.url 134 bytes
- 02. SOLID Principles/external-links/05. Source-code-All-examples-from-the-lecture.url 134 bytes
- 16. REST Architecture/external-links/05. Postman-collections.url 134 bytes
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/external-links/05. Source-code-examples-shown-in-the-lesson.url 132 bytes
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/external-links/04. Source-code-examples-shown-in-the-lesson.url 131 bytes
- 16. REST Architecture/external-links/03. Source-code-of-examples-commit-with-changes-.url 131 bytes
- 16. REST Architecture/external-links/05. Commit-with-changes.url 131 bytes
- 04. Object-oriented Architecture, Clean Code Design (Advanced)/external-links/07. Source-code-examples-shown-in-the-lesson.url 130 bytes
- 13. Logging in Java/external-links/01. java.util.logging-package-official-documentation.url 128 bytes
- 24. Bonus section/external-links/01. Java-Course-From-zero-to-first-job.url 128 bytes
- 08. Web Application Design Patterns/external-links/01. Source-code-example-from-the-lesson.url 126 bytes
- 01. Introduction/external-links/01. Telegram-Channel-with-Latest-News-coupons-and-important-information.url 122 bytes
- 09. ===== Exam DAO, Database, JDBC, SQL ======/external-links/01. Homework-description-and-reference-to-the-solution.url 122 bytes
- 10. ===== Exam MVC & Layered Architecture =====/external-links/01. Exam-task-description-and-reference-to-the-solution.url 122 bytes
- 11. Connection Pooling/external-links/01. Homework-task-and-source-code-of-the-solution.url 122 bytes
- 22. Tools, Automation, and Industry Best Practices/external-links/02. All-resources-and-links-for-the-lesson.url 122 bytes
- 22. Tools, Automation, and Industry Best Practices/external-links/03. All-resources-and-links-for-the-lesson.url 122 bytes
- 22. Tools, Automation, and Industry Best Practices/external-links/04. All-resources-and-links-for-the-lesson.url 122 bytes
- 24. Bonus section/external-links/01. Telegram-Channel-with-Latest-News-and-important-information.url 122 bytes
- 01. Introduction/external-links/02. Learn-IT-application-in-Play-Market.url 110 bytes
- 23. Advanced Code Review Strategies/external-links/01. All-documents-shared-in-the-lesson.url 110 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/13. pom.xml-from-the-lesson-with-OWASP-plugin.url 109 bytes
- 18. Behavioral Diagrams/external-links/01. Use-Case-Diagram-from-the-lesson.url 108 bytes
- 18. Behavioral Diagrams/external-links/02. Sequence-Diagram-User-Registration.url 108 bytes
- 18. Behavioral Diagrams/external-links/03. Activity-Diagram-Order-Processing-Workflow.url 108 bytes
- 18. Behavioral Diagrams/external-links/04. State-Machine-Diagram-Online-Shop.url 108 bytes
- 18. Behavioral Diagrams/external-links/05. Communication-Diagram-Online-Shop.url 108 bytes
- 18. Behavioral Diagrams/external-links/06. Timing-Diagram-Website-Loading.url 108 bytes
- 18. Behavioral Diagrams/external-links/07. Interaction-Overview-Diagram-Inspection.url 108 bytes
- 19. Structural Diagrams/external-links/01. Class-Diagram-Order-Processing.url 108 bytes
- 19. Structural Diagrams/external-links/02. Object-Diagram-Company-Structure.url 108 bytes
- 19. Structural Diagrams/external-links/03. Component-Diagram-Order-Processing.url 108 bytes
- 19. Structural Diagrams/external-links/04. Package-Diagram-Order-Processing.url 108 bytes
- 19. Structural Diagrams/external-links/05. Deployment-Diagram-Example.url 108 bytes
- 19. Structural Diagrams/external-links/06. Composite-Structure-Diagram-PC.url 108 bytes
- 19. Structural Diagrams/external-links/07. Profile-Diagram-EJB-Profile.url 108 bytes
- 23. Advanced Code Review Strategies/external-links/02. Coding-Standards-and-Guidelines.url 108 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/11. NIST-800-123-Guide-to-General-Server-Security.url 103 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/12. NIST-800-123-Guide-to-General-Server-Security.url 103 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/16. Computer-Security-Incident-Handling-Guide.url 100 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/11. NIST-800-207-Zero-Trust-Architecture.url 99 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/12. NIST-800-207-Zero-Trust-Architecture.url 99 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/13. Dependency-check-plugin.url 99 bytes
- 07. Databases Architecture from Scratch/external-links/04. How-to-Install-MySQL-on-MacOS.url 93 bytes
- 08. Web Application Design Patterns/external-links/03. Source-code-of-application-from-the-lesson-with-layered-architecture.url 89 bytes
- 13. Logging in Java/external-links/02. Log4J-2-Official-documentation-about-Appenders.url 84 bytes
- 13. Logging in Java/external-links/02. Log4J-2-Official-Documentation-about-Layouts.url 82 bytes
- 11. Connection Pooling/external-links/01. Documentation-for-attributes-of-connection-pooling-in-Tomcat.url 81 bytes
- 01. Introduction/external-links/02. Page-where-you-can-generate-FREE-bonus-code-for-your-self-to-remove-limits-in-Application.url 79 bytes
- 13. Logging in Java/external-links/02. Logback-configuration-documentation.url 74 bytes
- 01. Introduction/external-links/01. LinkedIn-of-the-Tutor.url 70 bytes
- 24. Bonus section/external-links/01. LinkedIn-Andrii-PIatakha.url 70 bytes
- 01. Introduction/external-links/01. Facebook-Page-with-Udemy-Coupons-from-Learn-IT-University.url 69 bytes
- 24. Bonus section/external-links/01. Facebook-Page-with-Udemy-Coupons-from-Learn-IT-University.url 69 bytes
- 24. Bonus section/external-links/01. Public-profile-of-Tutor-with-list-of-all-courses-Andrii-Piatakha.url 69 bytes
- 01. Introduction/external-links/01. Instagram-of-the-Tutor.url 68 bytes
- 01. Introduction/external-links/01. LinkedIn-IT-Bulls-company-official-page.url 68 bytes
- 07. Databases Architecture from Scratch/external-links/04. Microsoft-MySQL-Installer.url 68 bytes
- 24. Bonus section/external-links/01. Free-book-about-AI-by-Andrii-Piatakha-sci-fi-.url 68 bytes
- 24. Bonus section/external-links/01. Instagram-Andrii-Piatakha.url 68 bytes
- 24. Bonus section/external-links/01. LinkedIn-IT-Bulls-company-official-page.url 68 bytes
- 01. Introduction/external-links/01. Facebook-of-the-Tutor.url 66 bytes
- 24. Bonus section/external-links/01. Facebook-Andrii-Piatakha.url 66 bytes
- 01. Introduction/external-links/01. Patreon-account-of-the-Tutor.url 65 bytes
- 24. Bonus section/external-links/01. Support-me-on-Patreon-by-getting-access-to-EXCLUSIVE-content.url 65 bytes
- 12. Secure Software Architecture and Secure Coding/external-links/01. Common-Weakness-Enumeration-CWE-official-website.url 58 bytes
- 18. Behavioral Diagrams/external-links/01. Diagrams.net-App.url 51 bytes
- 01. Introduction/external-links/01. IT-Bulls-Company-Official-Web-Site.url 47 bytes
- 24. Bonus section/external-links/01. IT-Bulls-Company-Official-Web-Site.url 46 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.