磁力管家

磁力管家
为您索检到30条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [ CourseLala.com ] Udemy - Identifying And Building Digital Leadership Talent
收录时间:2024-07-24 文档个数:65 文档大小:825.9 MB 最近下载:2025-05-15 人气:872 磁力链接
  • mp4~Get Your Files Here !/5 - Specific Team Leader Responsibilities/5 - Specific Team Leader Responsibilities.mp4 168.1 MB
  • mp4~Get Your Files Here !/4 - Team Roles and Responsibilities/4 - Team Roles and Responsibilities.mp4 143.5 MB
  • mp4~Get Your Files Here !/3 - Team Leader Qualification/3 - Team Leader Qualification.mp4 137.8 MB
  • mp4~Get Your Files Here !/8 - Summary/9 - Summary.mp4 112.1 MB
  • mp4~Get Your Files Here !/7 - Team Training and Development/8 - Team Training and Development.mp4 75.2 MB
  • mp4~Get Your Files Here !/1 - Course Overview/1 - Course Overview.mp4 54.0 MB
  • mp4~Get Your Files Here !/6 - Team Management/6 - Team Management Part 1.mp4 52.6 MB
  • mp4~Get Your Files Here !/6 - Team Management/7 - Team Management Part 2.mp4 43.4 MB
  • mp4~Get Your Files Here !/2 - Intro to Building a Digital Dream Team/2 - Intro to Building a Digital Dream Team.mp4 38.1 MB
  • srt~Get Your Files Here !/4 - Team Roles and Responsibilities/4 - Team Roles and Responsibilities French.srt 29.1 kB
  • srt~Get Your Files Here !/4 - Team Roles and Responsibilities/4 - Team Roles and Responsibilities German.srt 28.3 kB
  • srt~Get Your Files Here !/4 - Team Roles and Responsibilities/4 - Team Roles and Responsibilities Portuguese.srt 27.6 kB
  • srt~Get Your Files Here !/4 - Team Roles and Responsibilities/4 - Team Roles and Responsibilities Italian.srt 27.5 kB
  • srt~Get Your Files Here !/4 - Team Roles and Responsibilities/4 - Team Roles and Responsibilities Indonesian.srt 26.9 kB
  • srt~Get Your Files Here !/5 - Specific Team Leader Responsibilities/5 - Specific Team Leader Responsibilities French.srt 26.2 kB
  • srt~Get Your Files Here !/4 - Team Roles and Responsibilities/4 - Team Roles and Responsibilities English.srt 26.2 kB
  • srt~Get Your Files Here !/3 - Team Leader Qualification/3 - Team Leader Qualification French.srt 26.1 kB
  • srt~Get Your Files Here !/3 - Team Leader Qualification/3 - Team Leader Qualification German.srt 25.5 kB
  • srt~Get Your Files Here !/3 - Team Leader Qualification/3 - Team Leader Qualification Indonesian.srt 25.3 kB
  • srt~Get Your Files Here !/3 - Team Leader Qualification/3 - Team Leader Qualification Portuguese.srt 25.0 kB
【影视】 Identifying Web Attacks Through Logs
收录时间:2022-01-25 文档个数:45 文档大小:559.1 MB 最近下载:2025-04-14 人气:428 磁力链接
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/24 SQL Injection Identifying Web Attacks Through Logs VO.mp4 45.3 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/28 Other Log Sources- Part 1 Identifying Web Attacks Through Logs VO.mp4 44.6 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/22 Vulnerability Scans Identifying Web Attacks Through Logs VO.mp4 40.5 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/21 Web Application Attacks Review Identifying Web Attacks Through Logs VO.mp4 40.1 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/12 Web Applications Architecture Review- Part 1 Identifying Web Attacks Through Logs VO.mp4 36.3 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/26 XSS- Cross-Site Scripting Identifying Web Attacks Through Logs VO.mp4 36.0 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/13 Web Applications Architecture Review- Part 2 Identifying Web Attacks Through Logs VO.mp4 34.6 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/17 Tips and Common Issues- Part 2 Identifying Web Attacks Through Logs VO.mp4 34.5 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/23 Brute Force Attacks Identifying Web Attacks Through Logs VO.mp4 34.2 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/29 Other Log Sources- Part 2 Identifying Web Attacks Through Logs VO.mp4 33.5 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/16 Tips and Common Issues- Part 1 Identifying Web Attacks Through Logs VO.mp4 31.3 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/25 File Inclusion Identifying Web Attacks Through Logs VO.mp4 30.7 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/15 Web Server Logs Review- Part 2 Identifying Web Attacks Through Logs VO.mp4 30.7 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/14 Web Server Logs Review- Part 1 Identifying Web Attacks Through Logs VO.mp4 27.4 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/27 CSRF- Cross Site Request Forgery Identifying Web Attacks Through Logs VO.mp4 18.3 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/11 Course Introduction Identifying Web Attacks Through Logs VO.mp4 15.5 MB
  • mp4[TutsNode.com] - Identifying Web Attacks Through Logs/210 Course Summary Identifying Web Attacks Through Logs VO.mp4 15.2 MB
  • pdf[TutsNode.com] - Identifying Web Attacks Through Logs/Study_Guide_-_Identifying_Web_Attacks_Through_Logs.pdf 4.8 MB
  • zip[TutsNode.com] - Identifying Web Attacks Through Logs/Lab_logs__1_.zip 1.6 MB
  • pdf[TutsNode.com] - Identifying Web Attacks Through Logs/QUIZ_-_Identifying_Web_Attacks_Through_logs.pdf 941.7 kB
【影视】 www.SceneTime.com - Easy Japanese for Work S01E22 Identifying Your Chance to
收录时间:2024-07-22 文档个数:6 文档大小:387.6 MB 最近下载:2025-02-10 人气:518 磁力链接
  • aviEasy.Japanese.for.Work.S01E22.Identifying.Your.Chance.to.Speak.at.a.Meeting.XviD-AFG.avi 386.5 MB
  • pngScreens/screen0003.png 457.3 kB
  • pngScreens/screen0001.png 423.7 kB
  • pngScreens/screen0002.png 243.9 kB
  • nfoEasy.Japanese.for.Work.S01E22.Identifying.Your.Chance.to.Speak.at.a.Meeting.XviD-AFG.nfo 1.2 kB
  • txtTorrent Downloaded From www.SceneTime.com.txt 85 Bytes
【影视】 Malware Analysis- Identifying and Defeating Code Obfuscation
收录时间:2024-08-12 文档个数:73 文档大小:375.1 MB 最近下载:2025-05-16 人气:2770 磁力链接
  • mp405. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.mp4 29.7 MB
  • mp406. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.mp4 27.2 MB
  • mp405. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.mp4 27.2 MB
  • mp405. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.mp4 26.3 MB
  • mp406. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.mp4 26.1 MB
  • mp403. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).mp4 24.9 MB
  • mp404. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.mp4 23.2 MB
  • mp403. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.mp4 21.8 MB
  • mp404. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.mp4 20.3 MB
  • mp403. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.mp4 20.3 MB
  • mp403. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.mp4 19.9 MB
  • mp406. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.mp4 15.5 MB
  • mp402. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.mp4 15.0 MB
  • mp404. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.mp4 11.3 MB
  • mp403. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.mp4 8.4 MB
  • mp406. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.mp4 7.2 MB
  • mp402. How Obfuscation Affects Your Analysis/04. What You Should Know.mp4 6.7 MB
  • mp404. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.mp4 6.3 MB
  • mp402. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.mp4 5.3 MB
  • mp401. Course Overview/01. Course Overview.mp4 4.4 MB
【影视】 [ www.torrenting.com ] - Motives.and.Murders.S04E01.Identifying.Remains.HDTV.XviD-AFG
收录时间:2017-03-08 文档个数:4 文档大小:364.1 MB 最近下载:2025-05-04 人气:267 磁力链接
  • txtDownloaded from [ www.torrenting.com ].txt 83 Bytes
  • aviMotives.and.Murders.S04E01.Identifying.Remains.HDTV.XviD-AFG.avi 364.1 MB
  • nfoMotives.and.Murders.S04E01.Identifying.Remains.HDTV.XviD-AFG.nfo 477 Bytes
  • txtwww.torrenting.com.txt 83 Bytes
【影视】 [UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
收录时间:2022-05-07 文档个数:38 文档大小:285.9 MB 最近下载:2025-05-15 人气:1880 磁力链接
  • mp405. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp4 20.7 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp4 20.7 MB
  • mp405. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp4 19.9 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp4 19.5 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp4 19.1 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp4 19.0 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp4 17.8 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp4 17.5 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp4 15.5 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp4 15.5 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp4 14.5 MB
  • mp401. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp4 12.3 MB
  • mp405. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp4 10.7 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp4 8.9 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp4 6.8 MB
  • mp405. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp4 6.0 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp4 5.3 MB
  • mp401. How Obfuscation Affects Your Analysis/03. What You Should Know.mp4 5.3 MB
  • mp401. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp4 4.3 MB
  • mp400. Course Overview/00. Course Overview.mp4 3.6 MB
【影视】 Pluralsight - Identifying Existing Products, Services, and Technologies in Use for Microsoft Azure by Jared Rhodes
收录时间:2021-04-01 文档个数:17 文档大小:231.2 MB 最近下载:2025-05-15 人气:2270 磁力链接
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/09.Visual Studio for Microsoft Azure.mp4 36.1 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/08.Java Tools for Microsoft Azure.mp4 33.4 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/10.VS Code for Microsoft Azure.mp4 26.4 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/02.Exploring the Docum.mp4 24.0 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/05.Additional Document.mp4 23.3 MB
  • mp43.Resolving Product, Services, Technology Dependencies, and Constraints/2.Exploring the Documenta.mp4 21.0 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/03.Exploring Product D.mp4 20.1 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/06.Migrating Lift and .mp4 13.6 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/07.Documenting the Right Tools.mp4 13.4 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/04.Event-driven Decisions.mp4 5.0 MB
  • mp41.Course Overview/1.Course Overview.mp4 4.2 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/01.Contoso Insurance.mp4 3.9 MB
  • mp42.Evaluating Feasibility of Tools Recommended in Architectural Design Spec/11.Review.mp4 2.3 MB
  • zipmicrosoft-azure-existing-.zip 1.8 MB
  • mp43.Resolving Product, Services, Technology Dependencies, and Constraints/1.Overview.mp4 1.5 MB
  • mp43.Resolving Product, Services, Technology Dependencies, and Constraints/3.Review.mp4 1.3 MB
  • txtcontent.txt 1.1 kB
【影视】 Identifying SaaS Operational Challenges for IT
收录时间:2018-08-29 文档个数:20 文档大小:120.6 MB 最近下载:2025-05-15 人气:1388 磁力链接
  • mp401.Course Overview/0101.Course Overview.mp4 3.3 MB
  • mp402.Operating a SaaS Solution/0201.Introduction.mp4 2.6 MB
  • mp402.Operating a SaaS Solution/0202.Why SaaS Is Good for IT.mp4 9.3 MB
  • mp402.Operating a SaaS Solution/0203.SaaS in Your Tech Stack & Processes.mp4 12.0 MB
  • mp403.Understanding the SaaS Technology Stack/0301.Introduction.mp4 3.7 MB
  • mp403.Understanding the SaaS Technology Stack/0302.Data Center Components.mp4 7.9 MB
  • mp403.Understanding the SaaS Technology Stack/0303.Application and As-a-Service Components.mp4 10.2 MB
  • mp403.Understanding the SaaS Technology Stack/0304.Separation of Responsibilities.mp4 7.4 MB
  • mp404.Integrating SaaS with Existing IT Systems/0401.Introduction.mp4 3.4 MB
  • mp404.Integrating SaaS with Existing IT Systems/0402.End-user Environment.mp4 6.5 MB
  • mp404.Integrating SaaS with Existing IT Systems/0403.Security & Authentication Systems.mp4 5.9 MB
  • mp404.Integrating SaaS with Existing IT Systems/0404.Data Integration.mp4 7.9 MB
  • mp404.Integrating SaaS with Existing IT Systems/0405.IT Support Systems & Integration Tips.mp4 7.7 MB
  • mp405.Integrating SaaS with Existing IT Processes/0501.Introduction.mp4 3.8 MB
  • mp405.Integrating SaaS with Existing IT Processes/0502.People Changes and System Provisioning.mp4 6.8 MB
  • mp405.Integrating SaaS with Existing IT Processes/0503.Change Management.mp4 5.3 MB
  • mp405.Integrating SaaS with Existing IT Processes/0504.System Resilience.mp4 4.9 MB
  • mp405.Integrating SaaS with Existing IT Processes/0505.Support.mp4 6.7 MB
  • mp405.Integrating SaaS with Existing IT Processes/0506.Planning.mp4 3.7 MB
  • zipExercise Files/identifying-saas-operational-challenges-it.zip 1.6 MB
【影视】 Pluralsight - Identifying Roles and Responsibilities in Microsoft Azure by Jason Edleman
收录时间:2021-03-13 文档个数:20 文档大小:108.9 MB 最近下载:2025-05-16 人气:2392 磁力链接
  • mp41. Understanding RACI/5. The RACI Process.mp4 15.0 MB
  • mp44. Define and Document Your Azure RACI – Consulted Parties/1. Example RACI and RBAC.mp4 13.3 MB
  • mp45. Define and Document Your Azure RACI – Informed Parties/0. Expanding the RACI to Informed Parties.mp4 10.8 MB
  • zipmicrosoft-azure-roles-responsibilities-identifying.zip 10.0 MB
  • mp41. Understanding RACI/2. Defining Responsible, Accountable, Consulted, and Informed.mp4 8.4 MB
  • mp41. Understanding RACI/1. What Is a RACI and What Is It Used For-.mp4 7.7 MB
  • mp43. Define and Document Your Azure RACI – Accountable Parties/2. Anatomy of a Custom Role.mp4 6.5 MB
  • mp40. Course Overview/0. Course Overview.mp4 5.0 MB
  • mp42. Define and Document Your Azure RACI – Responsible Parties/2. Assigning Responsible Roles.mp4 4.3 MB
  • mp43. Define and Document Your Azure RACI – Accountable Parties/1. Example and RBAC.mp4 4.1 MB
  • mp42. Define and Document Your Azure RACI – Responsible Parties/3. RACI and RBAC.mp4 3.9 MB
  • mp41. Understanding RACI/3. Other Variations on the Format.mp4 3.9 MB
  • mp41. Understanding RACI/0. Course Intro.mp4 3.5 MB
  • mp42. Define and Document Your Azure RACI – Responsible Parties/0. Responsible Parties Demonstration.mp4 3.1 MB
  • mp43. Define and Document Your Azure RACI – Accountable Parties/0. Defining Accountable Parties.mp4 2.5 MB
  • mp44. Define and Document Your Azure RACI – Consulted Parties/0. Consulted Parties.mp4 2.1 MB
  • mp42. Define and Document Your Azure RACI – Responsible Parties/1. Roles and Responsibilities.mp4 2.0 MB
  • mp45. Define and Document Your Azure RACI – Informed Parties/1. Course Summary.mp4 1.5 MB
  • mp41. Understanding RACI/4. What Does It Look Like-.mp4 1.4 MB
  • txtcontent.txt 1.4 kB
【影视】 [ DevCourseWeb.com ] Network Analysis - Identifying Network Protocols with Packet Analysis
收录时间:2025-02-08 文档个数:177 文档大小:106.3 MB 最近下载:2025-05-15 人气:369 磁力链接
  • mp4~Get Your Files Here !/1. Performing Packet Analysis with tcpdump/2. Using tcpdump to Monitor Network Traffic.mp4 11.3 MB
  • mp4~Get Your Files Here !/1. Performing Packet Analysis with tcpdump/3. Analyzing Network Traffic by Protocol.mp4 10.1 MB
  • mp4~Get Your Files Here !/1. Performing Packet Analysis with tcpdump/1. Setting up Our Working Environment.mp4 9.2 MB
  • pdf~Get Your Files Here !/02/create-calendar-columns-for-data-analysis-slides.pdf 7.1 MB
  • pdf~Get Your Files Here !/01/create-useful-text-columns-for-data-analysis-slides.pdf 7.0 MB
  • mp4~Get Your Files Here !/1. Performing Packet Analysis with tcpdump/4. Troubleshooting Network Connectivity Problems.mp4 6.8 MB
  • pdf~Get Your Files Here !/01/create-and-use-custom-functions-in-r-slides.pdf 6.6 MB
  • pbix~Get Your Files Here !/01/demos.pbix 6.5 MB
  • pdf~Get Your Files Here !/01/creating-access-to-a-system-slides.pdf 6.0 MB
  • pdf~Get Your Files Here !/03/evading-detection-using-advanced-payloads-slides.pdf 4.6 MB
  • pdf~Get Your Files Here !/01/foundations-of-github-identity-and-authentication-slides.pdf 4.5 MB
  • pdf~Get Your Files Here !/02/securing-github-with-sso-and-2fa-slides.pdf 3.9 MB
  • pdf~Get Your Files Here !/02/payload-generation-concepts-slides.pdf 3.3 MB
  • pdf~Get Your Files Here !/08/the-principle-of-working-with-objects-not-with-nulls-slides.pdf 3.3 MB
  • pdf~Get Your Files Here !/03/identity-management-with-scim-and-team-synchronization-slides.pdf 3.1 MB
  • pdf~Get Your Files Here !/01/performing-packet-analysis-with-tcpdump-slides.pdf 2.0 MB
  • pdf~Get Your Files Here !/02/understanding-limitations-of-traditional-defensive-code-slides.pdf 1.7 MB
  • pdf~Get Your Files Here !/09/building-rich-domain-model-as-an-effective-defense-by-design-slides.pdf 1.3 MB
  • pbix~Get Your Files Here !/02/demos/Dax Calendar Columns.pbix 1.2 MB
  • pbix~Get Your Files Here !/02/demos/DAX Text and Calendar Final.pbix 1.2 MB
共2页 上一页 1 2 下一页