磁力管家

磁力管家
为您索检到222条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 Securing a Kafka Cluster
收录时间:2024-04-23 文档个数:58 文档大小:513.7 MB 最近下载:2025-05-16 人气:2611 磁力链接
  • mp406. Authorizing Clients/06. Demo- Authorizing Kafka Connect.mp4 37.8 MB
  • mp405. Authenticating Clients/04. Demo- SASL PLAIN.mp4 37.4 MB
  • mp405. Authenticating Clients/09. Demo- SASL GSSAPI.mp4 37.3 MB
  • mp404. Encrypting Communication with Kafka/02. Demo- Kafka Clients TLS.mp4 35.9 MB
  • mp405. Authenticating Clients/05. SASL SCRAM.mp4 32.8 MB
  • mp405. Authenticating Clients/01. mTLS.mp4 31.7 MB
  • mp403. Encrypting Communication with Zookeeper/02. Demo- Zookeeper Quorum TLS.mp4 30.6 MB
  • mp404. Encrypting Communication with Kafka/05. Demo- End-to-end Encryption.mp4 29.8 MB
  • mp406. Authorizing Clients/04. Demo- Authorizing Producer and Consumer.mp4 25.9 MB
  • mp406. Authorizing Clients/05. Demo- Authorizing Kafka Streams.mp4 25.5 MB
  • mp406. Authorizing Clients/03. Demo- Setting up Authorization.mp4 25.3 MB
  • mp405. Authenticating Clients/06. SASL OAUTHBEARER.mp4 20.4 MB
  • mp403. Encrypting Communication with Zookeeper/03. Demo- Zookeeper Brokers TLS.mp4 18.5 MB
  • mp402. Handling Cryptography Containers/04. Demo- Creating Keystores and Truststores.mp4 13.7 MB
  • mp404. Encrypting Communication with Kafka/03. Demo- Inter Broker TLS.mp4 11.9 MB
  • zipsecuring-kafka-cluster.zip 10.0 MB
  • mp402. Handling Cryptography Containers/03. Public Key Infrastructure.mp4 9.9 MB
  • mp405. Authenticating Clients/08. Demo- Creating Kerberos Keytabs.mp4 9.6 MB
  • mp404. Encrypting Communication with Kafka/04. End-to-end Encryption.mp4 8.5 MB
  • mp405. Authenticating Clients/07. SASL GSSAPI and Delegation Token.mp4 8.4 MB
【压缩文件】 [ FreeCourseWeb.com ] PluralSight - Securing AWS Networks.zip
收录时间:2024-04-10 文档个数:1 文档大小:191.2 MB 最近下载:2025-05-10 人气:22 磁力链接
  • zip[ FreeCourseWeb.com ] PluralSight - Securing AWS Networks.zip 191.2 MB
【影视】 [ CourseWikia.com ] Linkedin - Securing the Use of Generative AI in Your Organization
收录时间:2024-03-06 文档个数:40 文档大小:205.2 MB 最近下载:2025-04-28 人气:420 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/02 - Public AI Risk Mitigation.mp4 31.4 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/05 - Hallucinations.mp4 23.8 MB
  • mp4~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/02 - Governance of Generative AI.mp4 17.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - Security Challenges in Generative AI.mp4 16.9 MB
  • mp4~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/01 - NIST AI Risk management Framework.mp4 14.5 MB
  • mp4~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/03 - Writing your Generative AI Policy.mp4 13.6 MB
  • mp4~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/03 - Introducing the MITIGATE AI Cyber framework.mp4 12.1 MB
  • mp4~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/01 - Top threats presented by Public AI.mp4 10.0 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/01 - Data Poisoning and Prompt Injection Attacks.mp4 9.5 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/03 - Model poisoning and manipulation.mp4 8.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/06 - Inadequate sandboxing and malcious code execution.mp4 8.3 MB
  • mp4~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/02 - AI browser plugin risk management.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/02 - Model Inversion and Data Leakage.mp4 7.4 MB
  • mp4~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/01 - Ethical and Bias Considerations in Generative AI.mp4 6.6 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Gen AI Fortified Your roadmap ahead.mp4 6.0 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/04 - Model and Stealing.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Introduction to Generative AI.mp4 4.8 MB
  • pdf~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Apply the TRUSTED Framework.pdf 40.1 kB
  • pdf~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Write your Gen AI policy.pdf 37.8 kB
  • pdf~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/AI Browser Plugin and Extension Strategy and Plan.pdf 33.3 kB
【压缩文件】 [ FreeCourseWeb.com ] Udemy - IT Security 101 - Protecting and Securing Computer Networks.zip
收录时间:2024-03-01 文档个数:1 文档大小:414.2 MB 最近下载:2025-05-08 人气:549 磁力链接
  • zip[ FreeCourseWeb.com ] Udemy - IT Security 101 - Protecting and Securing Computer Networks.zip 414.2 MB
【影视】 [ FreeCourseWeb.com ] PluralSight - Securing Microservices in ASP.NET Core
收录时间:2024-02-26 文档个数:4977 文档大小:1.0 GB 最近下载:2025-05-14 人气:1083 磁力链接
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/12. Demo - Using the Identity Microservice to Log In.mp4 61.5 MB
  • mp4~Get Your Files Here !/5. Improving the API Gateway Pattern/6. Demo - Making the Gateway Responsible for Exchanging Tokens.mp4 55.9 MB
  • mp4~Get Your Files Here !/7. Securing Async Service Communication/5. Demo - Sending and Validating a Token.mp4 54.5 MB
  • mp4~Get Your Files Here !/5. Improving the API Gateway Pattern/4. Demo - Configuring the Gateway for Scope-based Microservice Access Authorization.mp4 52.7 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/10. Demo - Accessing a Microservice on Behalf of the Client Application.mp4 41.9 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/10. Demo - Service to Service Communication on Behal.mp4 37.2 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/15. Demo - Accessing a Microservice on Behalf of the User.mp4 35.5 MB
  • mp4~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/6. Demo - Integrating Ocelot with Our Identity Service.mp4 31.8 MB
  • mp4~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/5. Demo - Adding Token Store Support for Custom Flows.mp4 30.6 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/9. Demo - Adding Support for the Token Exchange Gran.mp4 28.9 MB
  • mp4~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/5. Demo - Adding Ocelot.mp4 28.5 MB
  • mp4~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/8. Demo - Passing User Information to a Microservice.mp4 28.3 MB
  • mp4~Get Your Files Here !/5. Improving the API Gateway Pattern/3. Demo - Making Microservices Responsible for Validating Incoming Tokens.mp4 26.9 MB
  • mp4~Get Your Files Here !/7. Securing Async Service Communication/4. Demo - Requesting a Token.mp4 25.7 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/6. Demo - Authorization with Scopes Inside of a Micr.mp4 24.6 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/7. Demo - Inspecting an Identity Service.mp4 23.8 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/3. Demo - Tightening Access with One Audience per Mi.mp4 23.3 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/9. Demo - Blocking Access to a Microservice.mp4 23.1 MB
  • mp4~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/3. Demo - Refreshing Tokens with IdentityModel.AspNetCore.mp4 22.3 MB
  • mp4~Get Your Files Here !/7. Securing Async Service Communication/7. Demo - Dealing with Token Expiration.mp4 21.5 MB
【其他】 Randy E. Barnett - Our Republican Constitution Securing the Liberty and Sovereignty
收录时间:2024-02-25 文档个数:4 文档大小:258.6 MB 最近下载:2025-05-15 人气:1825 磁力链接
  • m4bOur Republican Constitution Securing the Liberty and Sovereignty of We the People.m4b 258.5 MB
  • jpgOur Republican Constitution Securing the Liberty and Sovereignty of We the People.jpg 58.7 kB
  • nfoOur Republican Constitution Securing the Liberty and Sovereignty of We the People.nfo 1.4 kB
  • cueOur Republican Constitution Securing the Liberty and Sovereignty of We the People.cue 823 Bytes
【压缩文件】 [FreeCoursesOnline.Me] BlackHat - Attacking-and-Securing-APIs-Course
收录时间:2024-02-22 文档个数:18 文档大小:12.0 GB 最近下载:2025-05-16 人气:7973 磁力链接
  • rarCopy of BHUSA 2021 Attacking and Securing APIs OVF.rar 8.1 GB
  • mkvDay1/Day1/#7.mkv 981.4 MB
  • mkvDay2/Day2/#1.mkv 864.1 MB
  • mkvDay1/Day1/#1.mkv 484.0 MB
  • mkvDay2/Day2/#5.mkv 389.5 MB
  • mkvDay2/Day2/#3.mkv 341.4 MB
  • mkvDay1/Day1/#5.mkv 223.5 MB
  • mkvDay2/Day2/#2.mkv 191.4 MB
  • mkvDay1/Day1/#6.mkv 172.0 MB
  • pdfAttacking and Securing APIs Course - BHUSA 2021.pdf 97.1 MB
  • mkvDay1/Day1/#4.mkv 79.1 MB
  • mkvDay1/Day1/#2.mkv 35.1 MB
  • mkvDay1/Day1/#3.mkv 21.7 MB
  • mkvDay2/Day2/#4.mkv 11.7 MB
  • url0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
  • urlFreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
  • url0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
  • txtSupport Us.txt 185 Bytes
【影视】 [ DevCourseWeb.com ] Udemy - Securing Your Ubuntu Environment - Best Practices
收录时间:2024-02-17 文档个数:15 文档大小:352.3 MB 最近下载:2025-05-16 人气:4607 磁力链接
  • mp4~Get Your Files Here !/1. Introduction/12. Backup.mp4 54.0 MB
  • mp4~Get Your Files Here !/1. Introduction/2. Password Policy.mp4 53.4 MB
  • mp4~Get Your Files Here !/1. Introduction/8. System Audit.mp4 46.1 MB
  • mp4~Get Your Files Here !/1. Introduction/5. Firewall.mp4 45.3 MB
  • mp4~Get Your Files Here !/1. Introduction/7. Disable Services.mp4 43.0 MB
  • mp4~Get Your Files Here !/1. Introduction/9. Remove Unused Software.mp4 20.8 MB
  • mp4~Get Your Files Here !/1. Introduction/3. Screen Lock.mp4 18.3 MB
  • mp4~Get Your Files Here !/1. Introduction/4. Updates.mp4 18.2 MB
  • mp4~Get Your Files Here !/2. Historical Security Bugs/1. Malicious Guest Session.mp4 17.8 MB
  • mp4~Get Your Files Here !/1. Introduction/6. Only Trust the App Store.mp4 16.2 MB
  • mp4~Get Your Files Here !/1. Introduction/11. Snap Permissions.mp4 11.1 MB
  • mp4~Get Your Files Here !/1. Introduction/10. Web Browser.mp4 8.1 MB
  • html~Get Your Files Here !/1. Introduction/1. Introduction.html 470 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 05 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4
收录时间:2024-02-16 文档个数:1 文档大小:3.2 GB 最近下载:2025-05-09 人气:165 磁力链接
  • mp405 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4 3.2 GB
【影视】 [ TutPig.com ] Oreilly - Securing Your DevOps Pipelines
收录时间:2024-02-14 文档个数:35 文档大小:675.1 MB 最近下载:2025-05-15 人气:2515 磁力链接
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/005. 3.4 Use DAST tools.mp4 47.0 MB
  • mp4~Get Your Files Here !/Lesson 5 Final Security Checks/003. 5.2 Use Kali Linux tools.mp4 41.5 MB
  • mp4~Get Your Files Here !/Lesson 4 Setting up a DevSecOps Pipeline/006. 4.5 Add security to each step.mp4 41.2 MB
  • mp4~Get Your Files Here !/Lesson 4 Setting up a DevSecOps Pipeline/005. 4.4 Break down the pipeline steps.mp4 38.2 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/003. 3.2 Use SAST tools.mp4 36.1 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/009. 3.8 Use OAST tools.mp4 35.0 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/007. 3.6 Use IAST tools.mp4 33.6 MB
  • mp4~Get Your Files Here !/Lesson 2 Security in DevOps or DevSecOps/004. 2.3 Learn the OWASP 10 top security risks.mp4 31.6 MB
  • mp4~Get Your Files Here !/Lesson 5 Final Security Checks/005. 5.4 Perform compliance audits.mp4 29.6 MB
  • mp4~Get Your Files Here !/Lesson 4 Setting up a DevSecOps Pipeline/004. 4.3 Write the CircleCI config.mp4 24.8 MB
  • mp4~Get Your Files Here !/Lesson 1 Background on DevOps/003. 1.2 Learn how DevOps works.mp4 23.7 MB
  • mp4~Get Your Files Here !/Lesson 1 Background on DevOps/004. 1.3 DevOps versus Waterfall.mp4 22.0 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/004. 3.3 Learn about DAST.mp4 21.9 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/008. 3.7 Learn about OAST.mp4 21.3 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/006. 3.5 Learn about IAST.mp4 20.7 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/002. 3.1 Learn about SAST.mp4 18.9 MB
  • mp4~Get Your Files Here !/Lesson 2 Security in DevOps or DevSecOps/005. 2.4 Understand how attackers gain unauthorized access to apps.mp4 16.3 MB
  • mp4~Get Your Files Here !/Introduction/001. Securing Your DevOps Pipelines Introduction.mp4 15.3 MB
  • mp4~Get Your Files Here !/Lesson 2 Security in DevOps or DevSecOps/003. 2.2 Learn how issues get to production.mp4 15.0 MB
  • mp4~Get Your Files Here !/Summary/001. Securing Your DevOps Pipelines Summary.mp4 14.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cloud Security Fundamentals - Securing Your Cloud Journey
收录时间:2024-02-04 文档个数:8 文档大小:520.9 MB 最近下载:2025-05-16 人气:2388 磁力链接
  • mp4~Get Your Files Here !/5 - Cloud Security Unique Challanges Part1.mp4 421.0 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 59.8 MB
  • mp4~Get Your Files Here !/2 - Cloud Computing Service Models.mp4 14.2 MB
  • mp4~Get Your Files Here !/6 - Cloud Security Unique Challanges Part2.mp4 11.4 MB
  • mp4~Get Your Files Here !/3 - Technology That Makes Cloud Computing Possible.mp4 8.8 MB
  • mp4~Get Your Files Here !/4 - Cloud Computing Deployment Models.mp4 5.7 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 LinkedIn Learning - Node.js Securing RESTful APIs [CoursesGhar]
收录时间:2024-01-12 文档个数:43 文档大小:141.9 MB 最近下载:2025-04-10 人气:170 磁力链接
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[3] Add the handlers for login.mp4 15.5 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[5] Add JWT setup into index.mp4 14.5 MB
  • mp4[3] 2. Setting Up the Node API [CoursesGhar.Com]/[1] Base project template intro.mp4 12.3 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[4] Finalize secured endpoints.mp4 12.1 MB
  • mp4[3] 2. Setting Up the Node API [CoursesGhar.Com]/[2] Finalize the setup for the project.mp4 11.9 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[2] Add the handlers for registration.mp4 11.4 MB
  • mp4[2] 1. Setting Up [CoursesGhar.Com]/[2] Introduction to OWASP.mp4 10.8 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[6] Test the API with Postman.mp4 9.3 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[1] Add the handlers for loginRequired.mp4 7.3 MB
  • mp4[3] 2. Setting Up the Node API [CoursesGhar.Com]/[4] Add bcrypt password hashing.mp4 6.9 MB
  • mp4[3] 2. Setting Up the Node API [CoursesGhar.Com]/[3] Create the user model.mp4 5.7 MB
  • mp4[1] Introduction [CoursesGhar.Com]/[1] Securing Node RESTful APIs.mp4 5.4 MB
  • mp4[5] 4. Other Options [CoursesGhar.Com]/[1] Alternatives for securing APIs.mp4 4.5 MB
  • mp4[2] 1. Setting Up [CoursesGhar.Com]/[4] Introduction to Postman.mp4 4.5 MB
  • mp4[2] 1. Setting Up [CoursesGhar.Com]/[3] Introduction to JWT.mp4 4.3 MB
  • mp4[2] 1. Setting Up [CoursesGhar.Com]/[1] Overview of the security threats.mp4 2.8 MB
  • mp4[6] Conclusion [CoursesGhar.Com]/[1] Explore and build your skills.mp4 1.4 MB
  • mp4[1] Introduction [CoursesGhar.Com]/[2] What you should know.mp4 1.2 MB
  • srt[3] 2. Setting Up the Node API [CoursesGhar.Com]/[1] Base project template intro.srt 9.5 kB
  • srt[3] 2. Setting Up the Node API [CoursesGhar.Com]/[2] Finalize the setup for the project.srt 8.9 kB
【影视】 [ DevCourseWeb.com ] Udemy - Hands-On ISA - IEC 62443 - Securing Industrial Systems
收录时间:2024-01-06 文档个数:86 文档大小:3.1 GB 最近下载:2025-05-16 人气:3070 磁力链接
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/3. Threat Modeling - Lab.mp4 186.1 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/7. Security Requirements (HA Docker component) - Lab.mp4 182.6 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/12. Security Verification and Validation Testing - Lab.mp4 169.7 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/5. Security Management - Lab.mp4 167.7 MB
  • mp4~Get Your Files Here !/3. Prerequisites for preparing the certification/10. Security requirements. IEC 62443-3-3 & IEC 62443-4-2.mp4 156.3 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/7. Specifying Security Requirements - Lab.mp4 147.9 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/1. Real Case - System Overview.mp4 122.6 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/8. Security Requirements (Water Valve component) - Lab.mp4 108.6 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/13. Security Verification and Validation Testing - Lab.mp4 103.9 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/15. Managing Security Issues - Lab.mp4 87.8 MB
  • mp4~Get Your Files Here !/3. Prerequisites for preparing the certification/3. Create and configure the Jira project - Lab.mp4 86.2 MB
  • mp4~Get Your Files Here !/3. Prerequisites for preparing the certification/9. Risk assessment. IEC 62443-3-2.mp4 82.6 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/9. Secure Product Design - Lab.mp4 80.9 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/4. JIRA Requirements Bulk - Lab.mp4 71.7 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/19. Providing Security User Documentation - Lab.mp4 70.2 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/17. Releasing Security Updates - Lab.mp4 65.5 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/15. Providing Security User Documentation - Lab.mp4 63.2 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/6. Security Requirements (Raspberry component) - Lab.mp4 62.4 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/12. Security Verification and Validation Testing.mp4 55.5 MB
  • mp4~Get Your Files Here !/2. IEC 62443 Overview/11. Certifications.mp4 55.4 MB
【影视】 [ FreeCourseWeb.com ] Securing SQL Server Applications
收录时间:2023-12-28 文档个数:55 文档大小:370.5 MB 最近下载:2025-05-16 人气:1478 磁力链接
  • mp4~Get Your Files Here !/3. Auditing/2. Setting up SQL Server Auditing at the Instance Level.mp4 35.3 MB
  • mp4~Get Your Files Here !/3. Auditing/4. Reading and Interpreting Audit Logs.mp4 29.8 MB
  • mp4~Get Your Files Here !/4. Encryption in SQL Server/6. Using Always Encrypted.mp4 26.1 MB
  • mp4~Get Your Files Here !/3. Auditing/1. Purpose and Advantages of Auditing and Logging.mp4 25.3 MB
  • mp4~Get Your Files Here !/4. Encryption in SQL Server/3. Encrypting Data in SQL Server.mp4 21.9 MB
  • mp4~Get Your Files Here !/6. Tools for Compliance Regulations/3. Keeping History Using Temporal Tables.mp4 21.3 MB
  • mp4~Get Your Files Here !/4. Encryption in SQL Server/7. Setting up Always Encrypted with Secure Enclaves.mp4 18.8 MB
  • mp4~Get Your Files Here !/6. Tools for Compliance Regulations/5. Using SQL Server Ledger.mp4 18.0 MB
  • mp4~Get Your Files Here !/2. Introduction to Advanced Security Topics/5. Using SSL with Client Connections.mp4 17.2 MB
  • mp4~Get Your Files Here !/4. Encryption in SQL Server/5. Encrypting Data at Rest.mp4 16.8 MB
  • mp4~Get Your Files Here !/4. Encryption in SQL Server/4. Encrypting Column Data.mp4 16.1 MB
  • mp4~Get Your Files Here !/3. Auditing/3. Setting up SQL Server Auditing in a Database.mp4 13.1 MB
  • mp4~Get Your Files Here !/4. Encryption in SQL Server/2. Using Hash Functions for Password Storage.mp4 13.0 MB
  • mp4~Get Your Files Here !/2. Introduction to Advanced Security Topics/1. SQL Server Security Overview.mp4 12.3 MB
  • mp4~Get Your Files Here !/6. Tools for Compliance Regulations/2. Masking Sensitive Data Using Dynamic Data Masking.mp4 12.3 MB
  • mp4~Get Your Files Here !/5. Fighting SQL Injection Attacks/4. Using Properly Stored Procedures and Dynamic SQL.mp4 11.7 MB
  • mp4~Get Your Files Here !/5. Fighting SQL Injection Attacks/2. Real World Injection Threats.mp4 10.7 MB
  • mp4~Get Your Files Here !/5. Fighting SQL Injection Attacks/1. Understanding SQL Injections.mp4 9.5 MB
  • mp4~Get Your Files Here !/5. Fighting SQL Injection Attacks/3. Protecting T-SQL Code Against Injections.mp4 8.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Advanced Security Topics/3. Recognizing Security Threats and Vulnerabilities.mp4 6.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - Securing Your Bitcoin
收录时间:2023-12-25 文档个数:8 文档大小:424.9 MB 最近下载:2025-05-14 人气:2238 磁力链接
  • mp4~Get Your Files Here !/5. Am I Safe on Linux.mp4 100.5 MB
  • mp4~Get Your Files Here !/3. Apps.mp4 97.1 MB
  • mp4~Get Your Files Here !/4. Sharing.mp4 94.8 MB
  • mp4~Get Your Files Here !/2. Desktop Wallet.mp4 61.6 MB
  • mp4~Get Your Files Here !/6. Am I Safe on Android.mp4 44.1 MB
  • mp4~Get Your Files Here !/1. Introduction.mp4 26.9 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 [Brazzers] (Kortney Kane, Madison Ivy) Securing the Will XXX (2014) (1080p HEVC)
收录时间:2023-12-24 文档个数:1 文档大小:818.4 MB 最近下载:2025-05-16 人气:3769 磁力链接
  • mp4[Brazzers] (Kortney Kane, Madison Ivy) Securing the Will XXX (2014) (1080p HEVC).mp4 818.4 MB
【文档书籍】 [ CourseMega.com ] Oreilly - AI Superstream Series - Securing AI
收录时间:2023-12-21 文档个数:9 文档大小:2.9 GB 最近下载:2025-04-25 人气:1425 磁力链接
  • ~Get Your Files Here !/00007 NatalieDullerud-CaPCConfidentialandPrivateCollaborativeLearningmp4~Get Your Files Here !/00007 NatalieDullerud-CaPCConfidentialandPrivateCollaborativeLearningmp4 507.1 MB
  • ~Get Your Files Here !/00005 ArijitSengupta-SolvingBiasandPrivacyChallengesinAIbyDesignSponsoredbyIntelmp4~Get Your Files Here !/00005 ArijitSengupta-SolvingBiasandPrivacyChallengesinAIbyDesignSponsoredbyIntelmp4 490.0 MB
  • Alani-AIUnderAttackRecentAttacksonMachineLearningThatYouShouldKnowAboutmp4~Get Your Files Here !/00003 MohammedM.Alani-AIUnderAttackRecentAttacksonMachineLearningThatYouShouldKnowAboutmp4 461.8 MB
  • ~Get Your Files Here !/00006 EthanJackson-PracticalUseCasesforPrivacyEnhancingTechniquesinDeepLearningmp4~Get Your Files Here !/00006 EthanJackson-PracticalUseCasesforPrivacyEnhancingTechniquesinDeepLearningmp4 452.6 MB
  • ~Get Your Files Here !/00002 JasonDai-Privacy-PreservingMachineLearningPPMLforBigDataAISponsoredbyIntelmp4~Get Your Files Here !/00002 JasonDai-Privacy-PreservingMachineLearningPPMLforBigDataAISponsoredbyIntelmp4 399.3 MB
  • ~Get Your Files Here !/00004 PatriciaThaine-Privacy-EnhancingTechnologiesinAISecuritymp4~Get Your Files Here !/00004 PatriciaThaine-Privacy-EnhancingTechnologiesinAISecuritymp4 373.6 MB
  • ~Get Your Files Here !/00001 IntroductionandTendaiGomo-KeynoteTheDevilIsintheDetailsmp4~Get Your Files Here !/00001 IntroductionandTendaiGomo-KeynoteTheDevilIsintheDetailsmp4 248.1 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 180 Bytes
【压缩文件】 [ DevCourseWeb.com ] LinuxAcademy - Concepts for Securing Your Servers.zip
收录时间:2023-12-19 文档个数:1 文档大小:691.8 MB 最近下载:2025-05-15 人气:2668 磁力链接
  • zip[ DevCourseWeb.com ] LinuxAcademy - Concepts for Securing Your Servers.zip 691.8 MB
【压缩文件】 Securing ASP.NET Core 6 with OAuth2 and OpenID Connect
收录时间:2023-12-18 文档个数:309 文档大小:2.0 GB 最近下载:2025-05-16 人气:7612 磁力链接
  • zipasp-dot-net-core-6-securing-oauth-2-openid-connect.zip 158.0 MB
  • mp404. Securing Your User Authentication Processes/04. Demo - Logging in with the Authorization Code Flow.mp4 80.0 MB
  • mp415. Integrating with ASP.NET Core Identity/3. Demo - Adding ASP.NET Core Identity.mp4 69.5 MB
  • mp411. Best Practices for User Management/03. Demo - Implementing a User Registration Screen.mp4 52.8 MB
  • mp414. Supporting Multi-factor Authentication/6. Supporting MFA with an Authenticator Application (Registration).mp4 50.9 MB
  • mp411. Best Practices for User Management/07. Demo - Activating an Account.mp4 43.9 MB
  • mp412. Integrating with Active Directory, Azure Active Directory, and Social Logins/06. Demo - Integrating Windows Authentication with IdentityServer.mp4 40.3 MB
  • mp416. Getting Ready for Production and Deploying Your Identity Provider/03. Demo - Persisting Configuration Data.mp4 40.2 MB
  • mp416. Getting Ready for Production and Deploying Your Identity Provider/06. Demo - Configuring Data Protection.mp4 39.1 MB
  • mp403. Understanding Authentication with OpenID Connect/6. Demo - Setting Up IdentityServer.mp4 38.2 MB
  • mp416. Getting Ready for Production and Deploying Your Identity Provider/07. Demo - Storing Key Material in Azure KeyVault.mp4 35.4 MB
  • mp408. Authorization Policies and Access Control/09. Demo - Creating Custom Requirements and Handlers.mp4 33.6 MB
  • mp413. User Provisioning, Federation, and Federated Identity/09. Demo - Linking a Provider to an Existing User.mp4 33.5 MB
  • mp408. Authorization Policies and Access Control/03. Demo - Creating an Authorization Policy.mp4 32.2 MB
  • mp413. User Provisioning, Federation, and Federated Identity/05. Demo - Provisioning a New User with a Federated Identity (Part 1).mp4 31.0 MB
  • mp407. Securing Your API/05. Demo - Securing Access to Your API (Part 2).mp4 30.6 MB
  • mp410. Storing Users and Credentials in a Local Database/08. Demo - Inspecting UI Interaction with IdentityServer.mp4 29.1 MB
  • mp407. Securing Your API/06. Demo - Passing an Access Token to Your API.mp4 28.3 MB
  • mp412. Integrating with Active Directory, Azure Active Directory, and Social Logins/11. Demo - Integrating with Azure AD.mp4 27.5 MB
  • mp410. Storing Users and Credentials in a Local Database/06. Demo - Creating a User Database.mp4 25.6 MB
【影视】 [ TutGator.com ] PluralSight - Securing REST Services Using Spring Security 5
收录时间:2023-12-18 文档个数:119 文档大小:735.3 MB 最近下载:2025-05-16 人气:2057 磁力链接
  • mp4~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/1. Introduction.mp4 53.6 MB
  • mp4~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.mp4 51.5 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.mp4 46.8 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.mp4 41.4 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.mp4 40.6 MB
  • mp4~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.mp4 39.9 MB
  • mp4~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.mp4 36.4 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.mp4 35.5 MB
  • mp4~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.mp4 24.1 MB
  • mp4~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.mp4 22.1 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.mp4 19.7 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.mp4 17.1 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.mp4 16.9 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.mp4 15.1 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.mp4 13.5 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.mp4 13.4 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.mp4 12.8 MB
  • mp4~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.mp4 12.0 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.mp4 11.7 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.mp4 11.1 MB
共12页 上一页 1 2 3 4 5 6 下一页