为您索检到134条磁力链接,耗时0毫秒。
- 【影视】 [ FreeCourseWeb.com ] PluralSight - Securing Microservices in ASP.NET Core
-
收录时间:2024-02-26
文档个数:4977
文档大小:1.0 GB
最近下载:2025-05-14
人气:1083
磁力链接
~Get Your Files Here !/2. Securing Your First Microservice/12. Demo - Using the Identity Microservice to Log In.mp4 61.5 MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/6. Demo - Making the Gateway Responsible for Exchanging Tokens.mp4 55.9 MB
~Get Your Files Here !/7. Securing Async Service Communication/5. Demo - Sending and Validating a Token.mp4 54.5 MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/4. Demo - Configuring the Gateway for Scope-based Microservice Access Authorization.mp4 52.7 MB
~Get Your Files Here !/2. Securing Your First Microservice/10. Demo - Accessing a Microservice on Behalf of the Client Application.mp4 41.9 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/10. Demo - Service to Service Communication on Behal.mp4 37.2 MB
~Get Your Files Here !/2. Securing Your First Microservice/15. Demo - Accessing a Microservice on Behalf of the User.mp4 35.5 MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/6. Demo - Integrating Ocelot with Our Identity Service.mp4 31.8 MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/5. Demo - Adding Token Store Support for Custom Flows.mp4 30.6 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/9. Demo - Adding Support for the Token Exchange Gran.mp4 28.9 MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/5. Demo - Adding Ocelot.mp4 28.5 MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/8. Demo - Passing User Information to a Microservice.mp4 28.3 MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/3. Demo - Making Microservices Responsible for Validating Incoming Tokens.mp4 26.9 MB
~Get Your Files Here !/7. Securing Async Service Communication/4. Demo - Requesting a Token.mp4 25.7 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/6. Demo - Authorization with Scopes Inside of a Micr.mp4 24.6 MB
~Get Your Files Here !/2. Securing Your First Microservice/7. Demo - Inspecting an Identity Service.mp4 23.8 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/3. Demo - Tightening Access with One Audience per Mi.mp4 23.3 MB
~Get Your Files Here !/2. Securing Your First Microservice/9. Demo - Blocking Access to a Microservice.mp4 23.1 MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/3. Demo - Refreshing Tokens with IdentityModel.AspNetCore.mp4 22.3 MB
~Get Your Files Here !/7. Securing Async Service Communication/7. Demo - Dealing with Token Expiration.mp4 21.5 MB
猜你喜欢:
Microservices
PluralSight
ASP
Securing
Core
FreeCourseWeb
NET
com
- 【影视】 [ CourseWikia.com ] Linkedin - Securing the Use of Generative AI in Your Organization
-
收录时间:2024-03-06
文档个数:40
文档大小:205.2 MB
最近下载:2025-04-28
人气:420
磁力链接
~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/02 - Public AI Risk Mitigation.mp4 31.4 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/05 - Hallucinations.mp4 23.8 MB
~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/02 - Governance of Generative AI.mp4 17.9 MB
~Get Your Files Here !/01 - Introduction/02 - Security Challenges in Generative AI.mp4 16.9 MB
~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/01 - NIST AI Risk management Framework.mp4 14.5 MB
~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/03 - Writing your Generative AI Policy.mp4 13.6 MB
~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/03 - Introducing the MITIGATE AI Cyber framework.mp4 12.1 MB
~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/01 - Top threats presented by Public AI.mp4 10.0 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/01 - Data Poisoning and Prompt Injection Attacks.mp4 9.5 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/03 - Model poisoning and manipulation.mp4 8.7 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/06 - Inadequate sandboxing and malcious code execution.mp4 8.3 MB
~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/02 - AI browser plugin risk management.mp4 7.7 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/02 - Model Inversion and Data Leakage.mp4 7.4 MB
~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/01 - Ethical and Bias Considerations in Generative AI.mp4 6.6 MB
~Get Your Files Here !/06 - Conclusion/01 - Gen AI Fortified Your roadmap ahead.mp4 6.0 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/04 - Model and Stealing.mp4 6.0 MB
~Get Your Files Here !/01 - Introduction/01 - Introduction to Generative AI.mp4 4.8 MB
~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Apply the TRUSTED Framework.pdf 40.1 kB
~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Write your Gen AI policy.pdf 37.8 kB
~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/AI Browser Plugin and Extension Strategy and Plan.pdf 33.3 kB
猜你喜欢:
Use
Securing
AI
CourseWikia
Linkedin
Generative
Organization
com
Your
- 【影视】 Securing a Kafka Cluster
-
收录时间:2024-04-23
文档个数:58
文档大小:513.7 MB
最近下载:2025-05-16
人气:2611
磁力链接
06. Authorizing Clients/06. Demo- Authorizing Kafka Connect.mp4 37.8 MB
05. Authenticating Clients/04. Demo- SASL PLAIN.mp4 37.4 MB
05. Authenticating Clients/09. Demo- SASL GSSAPI.mp4 37.3 MB
04. Encrypting Communication with Kafka/02. Demo- Kafka Clients TLS.mp4 35.9 MB
05. Authenticating Clients/05. SASL SCRAM.mp4 32.8 MB
05. Authenticating Clients/01. mTLS.mp4 31.7 MB
03. Encrypting Communication with Zookeeper/02. Demo- Zookeeper Quorum TLS.mp4 30.6 MB
04. Encrypting Communication with Kafka/05. Demo- End-to-end Encryption.mp4 29.8 MB
06. Authorizing Clients/04. Demo- Authorizing Producer and Consumer.mp4 25.9 MB
06. Authorizing Clients/05. Demo- Authorizing Kafka Streams.mp4 25.5 MB
06. Authorizing Clients/03. Demo- Setting up Authorization.mp4 25.3 MB
05. Authenticating Clients/06. SASL OAUTHBEARER.mp4 20.4 MB
03. Encrypting Communication with Zookeeper/03. Demo- Zookeeper Brokers TLS.mp4 18.5 MB
02. Handling Cryptography Containers/04. Demo- Creating Keystores and Truststores.mp4 13.7 MB
04. Encrypting Communication with Kafka/03. Demo- Inter Broker TLS.mp4 11.9 MB
securing-kafka-cluster.zip 10.0 MB
02. Handling Cryptography Containers/03. Public Key Infrastructure.mp4 9.9 MB
05. Authenticating Clients/08. Demo- Creating Kerberos Keytabs.mp4 9.6 MB
04. Encrypting Communication with Kafka/04. End-to-end Encryption.mp4 8.5 MB
05. Authenticating Clients/07. SASL GSSAPI and Delegation Token.mp4 8.4 MB
猜你喜欢:
Cluster
Securing
Kafka
- 【影视】 Securing Your GitHub Project
-
收录时间:2024-06-01
文档个数:46
文档大小:221.9 MB
最近下载:2025-05-15
人气:1669
磁力链接
03. Securing Your Development Workflow/04. Protecting GitHub Actions Secrets.mp4 21.7 MB
04. Discovering Vulnerabilities in Dependencies and Code/04. Discovering Vulnerabilities Using Static Analysis.mp4 18.6 MB
02. Safeguarding Access to Your GitHub Repository/02. Open Sourcing a JavaScript Library.mp4 17.4 MB
04. Discovering Vulnerabilities in Dependencies and Code/03. Patching Vulnerable Dependencies.mp4 17.0 MB
03. Securing Your Development Workflow/01. Hardening the GitHub Flow.mp4 14.4 MB
05. Publishing Security Fixes/02. Fixing the Code.mp4 12.9 MB
02. Safeguarding Access to Your GitHub Repository/07. Configuring Commit Signing Keys.mp4 11.8 MB
04. Discovering Vulnerabilities in Dependencies and Code/02. Managing Vulnerabilities in Dependencies.mp4 11.3 MB
03. Securing Your Development Workflow/02. Preventing Sensitive Data Leaks.mp4 11.3 MB
05. Publishing Security Fixes/03. Publishing the Fix.mp4 11.2 MB
05. Publishing Security Fixes/01. Vulnerabilities in Open Source Code.mp4 10.5 MB
04. Discovering Vulnerabilities in Dependencies and Code/01. Open Source Dependencies.mp4 9.5 MB
github-project-securing.zip 9.5 MB
02. Safeguarding Access to Your GitHub Repository/06. Configuring 2FA.mp4 8.5 MB
03. Securing Your Development Workflow/03. Recovering from Sensitive Data Leak.mp4 8.3 MB
02. Safeguarding Access to Your GitHub Repository/05. Protecting User Credentials.mp4 7.4 MB
02. Safeguarding Access to Your GitHub Repository/04. Using SSH Keys.mp4 6.8 MB
02. Safeguarding Access to Your GitHub Repository/03. Understanding Open Source Security.mp4 5.3 MB
01. Course Overview/01. Course Overview.mp4 3.1 MB
03. Securing Your Development Workflow/05. Summary.mp4 1.5 MB
猜你喜欢:
Project
GitHub
Your
Securing
- 【影视】 New.Ivy.Ireland.Securing.A.Deal.2024.Hardcore.Roleplay.Black.ILUVY.mp4
-
收录时间:2024-06-06
文档个数:1
文档大小:559.2 MB
最近下载:2025-05-13
人气:775
磁力链接
New.Ivy.Ireland.Securing.A.Deal.2024.Hardcore.Roleplay.Black.ILUVY.mp4 559.2 MB
猜你喜欢:
Securing
Deal
ILUVY
2024
mp4
Black
Ireland
New
Hardcore
Ivy
- 【影视】 SheLovesBlack.24.04.11.Ivy.Ireland.Securing.A.Deal.XXX.720p.MP4-P2P[XC]
-
收录时间:2024-06-10
文档个数:2
文档大小:1.1 GB
最近下载:2025-05-16
人气:2526
磁力链接
shelovesblack.24.04.11.ivy.ireland.securing.a.deal.xxx.mp4 1.1 GB
Torrent Downloaded From XXXClub.to .nfo 34 Bytes
猜你喜欢:
11
XXX
Deal
Securing
24.04
SheLovesBlack
MP4
P2P
Ireland
XC
- 【影视】 B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4
-
收录时间:2024-08-04
文档个数:1
文档大小:1.1 GB
最近下载:2025-05-09
人气:21
磁力链接
B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4 1.1 GB
猜你喜欢:
Securing
Deal
GPNa8J
wIAA
720p
BBC
mp4
Ivy
buzzheavier
Ireland
- 【影视】 Securing Your Network from Attacks [CoursesGhar]
-
收录时间:2024-08-30
文档个数:47
文档大小:2.4 GB
最近下载:2025-04-20
人气:26
磁力链接
00008 Social_Engineering.mp4 142.2 MB
00028 Identifying_Phishing_Emails.mp4 106.6 MB
00009 Physical_Attacks.mp4 92.7 MB
00004 DOS_DDOS_Attacks.mp4 91.5 MB
00038 Damage_Control_and_Assessment.mp4 89.1 MB
00040 Developing_and_Learning_from_Your_Attack.mp4 86.7 MB
00039 Backup_and_Recovery.mp4 78.6 MB
00026 IP_What_is_IP_Addresses_Why_They_are_Important.mp4 76.9 MB
00029 Running_a_Phishing_Campaign.mp4 73.8 MB
00015 Employee_Reporting.mp4 72.9 MB
00005 A_Malicious_Hacker_s_Methodology.mp4 63.4 MB
00025 Network_Alert_Software_and_Monitoring_Meraki.mp4 63.4 MB
00003 Typical_Attacks_Against_a_Network.mp4 62.8 MB
00017 Antivirus_and_Console_Tools.mp4 61.0 MB
00012 What_is_an_Insider_Threat.mp4 60.5 MB
00018 Fake_Error_Messages_a_Look_at_Scareware_and_What_it_is.mp4 59.9 MB
00027 About_Phishing_Emails.mp4 59.4 MB
00037 Bitcoin_Tracking.mp4 58.9 MB
00023 Monitoring_Software.mp4 57.4 MB
00010 Getting_Sneaky_with_MiTM_and_DDOS_Attacks.mp4 54.7 MB
猜你喜欢:
Attacks
CoursesGhar
Your
Securing
Network
- 【影视】 Brazzers - DoctorAdventures - Kortney Kane & Madison Ivy (Securing the Will) -={SPARROW}=-
-
收录时间:2024-09-28
文档个数:4
文档大小:300.1 MB
最近下载:2025-04-04
人气:93
磁力链接
Brazzers - DoctorAdventures - Kortney Kane & Madison Ivy (Securing the Will) -={SPARROW}=-.mp4 299.7 MB
Torrent Uploaded By ShowStopper132203 aka SS132203.png 215.1 kB
-={ SPARROW }=-.jpg 110.7 kB
Torrent Downloaded From ExtraTorrent.cc.txt 3.4 kB
猜你喜欢:
Madison
Securing
SPARROW
Kane
Will
Brazzers
DoctorAdventures
Ivy
Kortney
- 【影视】 Securing Azure SQL Managed Instance
-
收录时间:2024-10-12
文档个数:10
文档大小:127.7 MB
最近下载:2025-05-15
人气:1764
磁力链接
03. Encryption and Data Privacy Measures/02. Data Privacy with Dynamic Data Masking and Row-level Security.mp4 23.4 MB
02. Advanced Security Features in Azure SQL Managed Instance/01. Auditing and Advanced Threat Protection.mp4 20.9 MB
01. Deployment and Connectivity Options under Security Isolation/02. Deployment Options for Secure Architecture.mp4 18.2 MB
03. Encryption and Data Privacy Measures/01. Implementing Encryption Policies.mp4 15.5 MB
02. Advanced Security Features in Azure SQL Managed Instance/02. Authentication and Authorization with Microsoft Entra.mp4 13.8 MB
01. Deployment and Connectivity Options under Security Isolation/03. Secure Connectivity Options.mp4 10.6 MB
01. Deployment and Connectivity Options under Security Isolation/01. Securing Azure SQL Managed Instance.mp4 10.0 MB
04. Best Practices and Special Considerations/01. Best Practices for Securing Azure SQL Managed Instance.mp4 6.0 MB
04. Best Practices and Special Considerations/02. Migrating and Restoring Encrypted Databases.mp4 5.1 MB
azure-sql-managed-instance-securing.zip 4.1 MB
猜你喜欢:
Azure
Instance
Managed
Securing
SQL
- 【影视】 Securing Generative AI
-
收录时间:2024-10-23
文档个数:34
文档大小:886.8 MB
最近下载:2025-05-16
人气:1388
磁力链接
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4 71.1 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 62.2 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.4 MB
Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.6 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.6 MB
Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.5 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.2 MB
Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
Introduction/001. Securing Generative AI Introduction.mp4 19.7 MB
Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.0 MB
猜你喜欢:
Generative
AI
Securing
- 【影视】 Securing SQL Server Applications
-
收录时间:2024-12-30
文档个数:53
文档大小:268.3 MB
最近下载:2025-05-15
人气:1285
磁力链接
03. Auditing/02. Setting up SQL Server Auditing at the Instance Level.mp4 22.1 MB
03. Auditing/04. Reading and Interpreting Audit Logs.mp4 18.1 MB
04. Encryption in SQL Server/06. Using Always Encrypted.mp4 17.8 MB
sql-server-securing-applications.zip 17.0 MB
03. Auditing/01. Purpose and Advantages of Auditing and Logging.mp4 16.5 MB
04. Encryption in SQL Server/03. Encrypting Data in SQL Server.mp4 14.0 MB
06. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.mp4 13.4 MB
04. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.mp4 12.4 MB
02. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.mp4 12.2 MB
04. Encryption in SQL Server/05. Encrypting Data at Rest.mp4 11.2 MB
06. Tools for Compliance Regulations/05. Using SQL Server Ledger.mp4 11.0 MB
02. Introduction to Advanced Security Topics/01. SQL Server Security Overview.mp4 10.2 MB
04. Encryption in SQL Server/04. Encrypting Column Data.mp4 10.2 MB
05. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.mp4 9.4 MB
03. Auditing/03. Setting up SQL Server Auditing in a Database.mp4 8.7 MB
04. Encryption in SQL Server/02. Using Hash Functions for Password Storage.mp4 8.5 MB
05. Fighting SQL Injection Attacks/02. Real World Injection Threats.mp4 8.0 MB
06. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.mp4 7.8 MB
05. Fighting SQL Injection Attacks/01. Understanding SQL Injections.mp4 7.7 MB
05. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.mp4 6.5 MB
猜你喜欢:
Applications
Server
Securing
SQL
- 【影视】 DoctorAdventures: Kortney Kane & Madison Ivy (Securing the Will) [XXX] x264
-
收录时间:2025-02-18
文档个数:1
文档大小:561.6 MB
最近下载:2025-05-12
人气:20
磁力链接
da_kortney_madison_vl013114_480p_2000.mp4 561.6 MB
猜你喜欢:
Madison
XXX
Securing
Kane
Will
x264
DoctorAdventures
Ivy
Kortney
- 【影视】 Buried Hearts S01E02 Dongju Taken Out by Attackers After Securing Slush Funds 1080p DSNP WEB-DL AAC2 0 H 264-playWEB[EZTVx.to].mkv
-
收录时间:2025-03-13
文档个数:1
文档大小:2.1 GB
最近下载:2025-05-15
人气:1833
磁力链接
Buried Hearts S01E02 Dongju Taken Out by Attackers After Securing Slush Funds 1080p DSNP WEB-DL AAC2 0 H 264-playWEB[EZTVx.to].mkv 2.1 GB
猜你喜欢:
WEB
DL
AAC2
264
Securing
Dongju
Funds
Slush
After
DSNP