磁力管家

磁力管家
为您索检到134条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 Ellie Idol - Securing My Position.1920x1080.mp4
收录时间:2018-10-02 文档个数:1 文档大小:1.3 GB 最近下载:2024-12-22 人气:80 磁力链接
  • mp4Ellie Idol - Securing My Position.1920x1080.mp4 1.3 GB
【影视】 SECURING-MY-POSITION.mp4
收录时间:2018-09-17 文档个数:1 文档大小:1.3 GB 最近下载:2025-05-05 人气:733 磁力链接
  • mp4SECURING-MY-POSITION.mp4 1.3 GB
【影视】 SheLovesBlack.24.04.11.Ivy.Ireland.Securing.A.Deal.XXX.720p.MP4-P2P[XC]
收录时间:2024-06-10 文档个数:2 文档大小:1.1 GB 最近下载:2025-05-16 人气:2526 磁力链接
  • mp4shelovesblack.24.04.11.ivy.ireland.securing.a.deal.xxx.mp4 1.1 GB
  • nfoTorrent Downloaded From XXXClub.to .nfo 34 Bytes
【影视】 B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4
收录时间:2024-08-04 文档个数:1 文档大小:1.1 GB 最近下载:2025-05-09 人气:21 磁力链接
  • mp4B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4 1.1 GB
【影视】 [ TutGator.com ] Linkedin - CompTIA Network + (N10-008) Cert Prep - 5 Securing TCP - IP
收录时间:2022-04-23 文档个数:26 文档大小:1.1 GB 最近下载:2025-05-16 人气:2263 磁力链接
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/09 - Single sign-on.mp4 199.0 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/10 - Certificates and trust.mp4 171.5 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/05 - Identification.mp4 156.6 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/11 - Certificate error scenarios.mp4 98.7 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/08 - KerberosEAP.mp4 91.0 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/01 - Making TCPIP secure.mp4 80.0 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/02 - Symmetric encryption.mp4 66.3 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/07 - AAA.mp4 59.3 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/04 - Cryptographic hashes.mp4 56.5 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/06 - Access control.mp4 51.2 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/03 - Asymmetric encryption.mp4 38.3 MB
  • pdf~Get Your Files Here !/Ex_Files_CompTIA_Network_plus_N10_088_Cert_Prep_5/Exercise Files/Chapter 10 Slide Handouts.pdf 583.8 kB
  • jpg~Get Your Files Here !/01 - 1. Securing TCPIP/01 - Making TCPIP secure.mp4.jpg 247.2 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/10 - Certificates and trust.srt 25.4 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/09 - Single sign-on.srt 19.2 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/11 - Certificate error scenarios.srt 15.9 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/05 - Identification.srt 15.1 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/08 - KerberosEAP.srt 12.8 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/02 - Symmetric encryption.srt 9.7 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/04 - Cryptographic hashes.srt 8.6 kB
【影视】 TutsPlus - Securing an AngularJS Application
收录时间:2017-03-03 文档个数:10 文档大小:1.0 GB 最近下载:2025-05-15 人气:545 磁力链接
  • mp401. Introduction/0101_Introduction.mp4 7.8 MB
  • mp402. Getting Started/0201_What You Need.mp4 107.4 MB
  • mp402. Getting Started/0202_Introducing Soundboard.mp4 179.2 MB
  • mp403. Thinking Differently/0301_Persisting Data in the Client.mp4 100.0 MB
  • mp403. Thinking Differently/0302_User Authentication With Bearer Tokens.mp4 143.8 MB
  • mp403. Thinking Differently/0303_Securing Dynamic Resources.mp4 154.3 MB
  • mp404. Client Security/0401_Securing Clients and Dynamic Resources.mp4 147.6 MB
  • mp404. Client Security/0402_Sanitizing User Input.mp4 73.0 MB
  • mp404. Client Security/0403_Preventing CSRF Attacks in CookieBased Applications.mp4 101.7 MB
  • mp405. Conclusion/0501_Conclusion.mp4 2.9 MB
【影视】 [ FreeCourseWeb.com ] PluralSight - Securing Microservices in ASP.NET Core
收录时间:2024-02-26 文档个数:4977 文档大小:1.0 GB 最近下载:2025-05-14 人气:1083 磁力链接
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/12. Demo - Using the Identity Microservice to Log In.mp4 61.5 MB
  • mp4~Get Your Files Here !/5. Improving the API Gateway Pattern/6. Demo - Making the Gateway Responsible for Exchanging Tokens.mp4 55.9 MB
  • mp4~Get Your Files Here !/7. Securing Async Service Communication/5. Demo - Sending and Validating a Token.mp4 54.5 MB
  • mp4~Get Your Files Here !/5. Improving the API Gateway Pattern/4. Demo - Configuring the Gateway for Scope-based Microservice Access Authorization.mp4 52.7 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/10. Demo - Accessing a Microservice on Behalf of the Client Application.mp4 41.9 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/10. Demo - Service to Service Communication on Behal.mp4 37.2 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/15. Demo - Accessing a Microservice on Behalf of the User.mp4 35.5 MB
  • mp4~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/6. Demo - Integrating Ocelot with Our Identity Service.mp4 31.8 MB
  • mp4~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/5. Demo - Adding Token Store Support for Custom Flows.mp4 30.6 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/9. Demo - Adding Support for the Token Exchange Gran.mp4 28.9 MB
  • mp4~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/5. Demo - Adding Ocelot.mp4 28.5 MB
  • mp4~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/8. Demo - Passing User Information to a Microservice.mp4 28.3 MB
  • mp4~Get Your Files Here !/5. Improving the API Gateway Pattern/3. Demo - Making Microservices Responsible for Validating Incoming Tokens.mp4 26.9 MB
  • mp4~Get Your Files Here !/7. Securing Async Service Communication/4. Demo - Requesting a Token.mp4 25.7 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/6. Demo - Authorization with Scopes Inside of a Micr.mp4 24.6 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/7. Demo - Inspecting an Identity Service.mp4 23.8 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/3. Demo - Tightening Access with One Audience per Mi.mp4 23.3 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/9. Demo - Blocking Access to a Microservice.mp4 23.1 MB
  • mp4~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/3. Demo - Refreshing Tokens with IdentityModel.AspNetCore.mp4 22.3 MB
  • mp4~Get Your Files Here !/7. Securing Async Service Communication/7. Demo - Dealing with Token Expiration.mp4 21.5 MB
【影视】 Madison Ivy, Kortney Kane - Securing Will.mp4
收录时间:2021-03-10 文档个数:1 文档大小:948.5 MB 最近下载:2025-05-07 人气:827 磁力链接
  • mp4Madison Ivy, Kortney Kane - Securing Will.mp4 948.5 MB
【影视】 Securing Generative AI
收录时间:2024-10-23 文档个数:34 文档大小:886.8 MB 最近下载:2025-05-16 人气:1388 磁力链接
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4 71.1 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 62.2 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.4 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.6 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.6 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.5 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.2 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
  • mp4Introduction/001. Securing Generative AI Introduction.mp4 19.7 MB
  • mp4Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.0 MB
【影视】 Securing ASP.NET Core 3 with OAuth2 and OpenID Connect
收录时间:2021-04-05 文档个数:182 文档大小:882.6 MB 最近下载:2024-06-16 人气:185 磁力链接
  • mp43. Securing Your User Authentication Processes/3. Demo - Logging In with the Authorization Code Flow.mp4 64.9 MB
  • mp46. Securing Your API/3. Demo - Passing an Access Token to Your API.mp4 39.2 MB
  • mp49. Getting Ready for Production/5. Demo - Persisting Configuration Data.mp4 38.1 MB
  • mp48. Dealing with Token Expiration and Reference Tokens/5. Demo - Gaining Long-lived Access.mp4 35.5 MB
  • mp47. Authorization Policies and Access Control/5. Demo - Creating Custom Requirements and Handlers.mp4 32.8 MB
  • mp46. Securing Your API/2. Demo - Securing Access to Your API.mp4 31.2 MB
  • mp44. Working with Claims in Your Web Application/5. Demo - Manually Calling the UserInfo Endpoint to Get More Claims.mp4 30.7 MB
  • mp42. Implementing Authentication with OpenID Connect/6. Demo - Setting up IdentityServer4.mp4 26.3 MB
  • mp44. Working with Claims in Your Web Application/2. Demo - Claims Transformation- Manipulating the Claims Collection.mp4 25.0 MB
  • mp46. Securing Your API/8. Demo - Protecting the API When Creating a Resource (with Roles).mp4 23.4 MB
  • mp44. Working with Claims in Your Web Application/4. Demo - Getting Ready for Calling the UserInfo Endpoint.mp4 23.2 MB
  • mp44. Working with Claims in Your Web Application/7. Demo - Role-based Authorization- Ensuring the Role Is Included.mp4 22.3 MB
  • mp46. Securing Your API/5. Demo - Using Access Token Claims when Getting a Resource Collection.mp4 21.2 MB
  • mp47. Authorization Policies and Access Control/2. Demo - Creating a Simple Authorization Policy.mp4 17.9 MB
  • mp43. Securing Your User Authentication Processes/9. Demo - Redirecting After Logging Out.mp4 16.8 MB
  • mp43. Securing Your User Authentication Processes/7. Demo - Logging Out of Our Web Application.mp4 16.1 MB
  • mp43. Securing Your User Authentication Processes/1. The Authorization Code Flow.mp4 15.9 MB
  • mp47. Authorization Policies and Access Control/3. Demo - Using an Authorization Policy.mp4 15.1 MB
  • mp44. Working with Claims in Your Web Application/1. Demo - Claims Transformation- Keeping the Original Claim Types.mp4 14.6 MB
  • mp48. Dealing with Token Expiration and Reference Tokens/4. Demo - Supporting Refresh Tokens.mp4 13.7 MB
【影视】 WWE.Ruthless.Aggression.S02E05.Securing.the.Future.720p.WEB.H264-DARKSPORT[rarbg]
收录时间:2022-01-09 文档个数:4 文档大小:840.5 MB 最近下载:2025-05-13 人气:534 磁力链接
  • mkvWWE.Ruthless.Aggression.S02E05.Securing.the.Future.720p.WEB.H264-DARKSPORT.mkv 840.5 MB
  • nfowwe.ruthless.aggression.s02e05.securing.the.future.720p.web.h264-darksport.nfo 9.1 kB
  • exeRARBG_DO_NOT_MIRROR.exe 99 Bytes
  • txtRARBG.txt 30 Bytes
【影视】 Cassidy Klein - Primal Fetish - Securing Project Funding (2017).mp4
收录时间:2017-04-03 文档个数:1 文档大小:825.6 MB 最近下载:2025-05-16 人气:4620 磁力链接
  • mp4Cassidy Klein - Primal Fetish - Securing Project Funding (2017).mp4 825.6 MB
【影视】 Infinite Skills - Securing Cloud Services
收录时间:2017-04-05 文档个数:52 文档大小:821.6 MB 最近下载:2025-05-15 人气:1053 磁力链接
  • MP401. Introduction To Cloud Services/0101 Introduction And About The Author.MP4 8.3 MB
  • MP401. Introduction To Cloud Services/0102 Service Models.MP4 19.0 MB
  • MP401. Introduction To Cloud Services/0103 Service And Deployment Models.MP4 12.5 MB
  • MP401. Introduction To Cloud Services/0104 Deployment Models Summary.MP4 11.0 MB
  • MP401. Introduction To Cloud Services/0105 Deployment Models And Benefits.MP4 23.7 MB
  • MP401. Introduction To Cloud Services/0106 Distributed Processing - The Reverse Cloud.MP4 17.6 MB
  • MP401. Introduction To Cloud Services/0107 Building Internal Cloud Hardware.MP4 15.3 MB
  • MP401. Introduction To Cloud Services/0108 Building Internal Cloud Software.MP4 9.8 MB
  • MP401. Introduction To Cloud Services/0109 Using An External Cloud.MP4 21.3 MB
  • MP402. Securing The Infrastructure/0201 Introduction.MP4 17.8 MB
  • MP402. Securing The Infrastructure/0202 Framework.MP4 20.7 MB
  • MP402. Securing The Infrastructure/0203 Policy Samples.MP4 25.3 MB
  • MP402. Securing The Infrastructure/0204 Risk Management Introduction.MP4 7.7 MB
  • MP402. Securing The Infrastructure/0205 Risk Assessment.MP4 13.4 MB
  • MP402. Securing The Infrastructure/0206 Risk Management.MP4 17.0 MB
  • MP402. Securing The Infrastructure/0207 Security Program And CIA.MP4 10.3 MB
  • MP402. Securing The Infrastructure/0208 CIA.MP4 26.1 MB
  • MP402. Securing The Infrastructure/0209 Types Of Security.MP4 18.8 MB
  • MP402. Securing The Infrastructure/0210 Sensitive Data.MP4 23.3 MB
  • MP402. Securing The Infrastructure/0211 Data Classification.MP4 13.3 MB
【影视】 [Brazzers] (Kortney Kane, Madison Ivy) Securing the Will XXX (2014) (1080p HEVC)
收录时间:2023-12-24 文档个数:1 文档大小:818.4 MB 最近下载:2025-05-16 人气:3769 磁力链接
  • mp4[Brazzers] (Kortney Kane, Madison Ivy) Securing the Will XXX (2014) (1080p HEVC).mp4 818.4 MB
【影视】 Windows Server 2008 R2 Hacking and Securing
收录时间:2021-04-05 文档个数:118 文档大小:799.6 MB 最近下载:2025-05-15 人气:1237 磁力链接
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/09 Rootkits and Stealth Apps_ Creating and Revealing v2.0 course/038 Writing a shellcode.mp4 188.7 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/10 BONUS section - get your coupon code here/039 Become CISS - Certified Ethical Hacking Training.mp4 84.4 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/07 Certificates/031 Certificates authority.mp4 30.2 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/03 Security policies/010 Windows security settings.mp4 29.2 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/04 Data and application security/018 Data encription.mp4 25.3 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/01 Introduction/003 System security policy - basics.mp4 25.0 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/04 Data and application security/022 AppLocker in practice.mp4 21.0 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/08 Testing configuration/035 CA website.mp4 20.8 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/03 Security policies/015 SCM_ Managing templates.mp4 20.6 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/08 Testing configuration/037 Now it's your turn. Thank you for taking part in our training.mp4 20.4 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/08 Testing configuration/034 How to check settings in real environment_.mp4 19.9 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/07 Certificates/032 Using CA.mp4 19.9 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/01 Introduction/002 Let's begin with some theory.mp4 19.5 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/03 Security policies/013 SCM_ Reviewing options.mp4 18.6 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/04 Data and application security/017 Theoretical basics about data and app security.mp4 17.4 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/08 Testing configuration/036 Attack Surface Analyzer.mp4 15.1 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/05 Monitoring security level/023 What you should know about monitoring the security.mp4 14.6 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/04 Data and application security/021 Executable rules.mp4 14.5 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/06 Group policy managment/028 Group Policies.mp4 14.2 MB
  • mp4[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/06 Group policy managment/029 Linking the GPO.mp4 12.6 MB
【影视】 [ CoursePig.com ] Securing a Spring Boot REST API Using Spring Security with iPad Pro and Raspberry Pi 4
收录时间:2022-02-04 文档个数:18 文档大小:745.3 MB 最近下载:2025-05-11 人气:1275 磁力链接
  • mp4~Get Your Files Here !/04-Secure the API.mp4 163.3 MB
  • mp4~Get Your Files Here !/06-Add Authentication Support to Services.mp4 158.0 MB
  • mp4~Get Your Files Here !/07-Add Authentication Support to Controllers.mp4 157.1 MB
  • mp4~Get Your Files Here !/03-Build JWT Support.mp4 137.0 MB
  • mp4~Get Your Files Here !/05-Overview of Security Payload.mp4 50.9 MB
  • mp4~Get Your Files Here !/08-Testing the API.mp4 43.7 MB
  • mp4~Get Your Files Here !/02-Introduction.mp4 30.1 MB
  • mp4~Get Your Files Here !/01-Summary.mp4 5.1 MB
  • srt~Get Your Files Here !/04-Secure the API.en.srt 14.4 kB
  • srt~Get Your Files Here !/03-Build JWT Support.en.srt 13.7 kB
  • srt~Get Your Files Here !/07-Add Authentication Support to Controllers.en.srt 12.5 kB
  • srt~Get Your Files Here !/06-Add Authentication Support to Services.en.srt 11.5 kB
  • srt~Get Your Files Here !/08-Testing the API.en.srt 7.6 kB
  • srt~Get Your Files Here !/02-Introduction.en.srt 6.9 kB
  • srt~Get Your Files Here !/05-Overview of Security Payload.en.srt 6.7 kB
  • srt~Get Your Files Here !/01-Summary.en.srt 1.2 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 179 Bytes
【影视】 Cisco live CCSP Securing Networks with ASA.avi
收录时间:2017-04-11 文档个数:1 文档大小:742.4 MB 最近下载:2025-05-14 人气:481 磁力链接
  • aviCisco live CCSP Securing Networks with ASA.avi 742.4 MB
【影视】 [ TutGator.com ] PluralSight - Securing REST Services Using Spring Security 5
收录时间:2023-12-18 文档个数:119 文档大小:735.3 MB 最近下载:2025-05-16 人气:2057 磁力链接
  • mp4~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/1. Introduction.mp4 53.6 MB
  • mp4~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.mp4 51.5 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.mp4 46.8 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.mp4 41.4 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.mp4 40.6 MB
  • mp4~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.mp4 39.9 MB
  • mp4~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.mp4 36.4 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.mp4 35.5 MB
  • mp4~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.mp4 24.1 MB
  • mp4~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.mp4 22.1 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.mp4 19.7 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.mp4 17.1 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.mp4 16.9 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.mp4 15.1 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.mp4 13.5 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.mp4 13.4 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.mp4 12.8 MB
  • mp4~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.mp4 12.0 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.mp4 11.7 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.mp4 11.1 MB
【影视】 [PrimalFetish] Cassidy Klein - Securing Project Funding (26.03.2017) rq.mp4
收录时间:2017-04-07 文档个数:1 文档大小:718.7 MB 最近下载:2025-04-08 人气:1747 磁力链接
  • mp4[PrimalFetish] Cassidy Klein - Securing Project Funding (26.03.2017) rq.mp4 718.7 MB
【影视】 Cybersecurity Basics Securing your life in the digital age
收录时间:2021-03-08 文档个数:107 文档大小:718.3 MB 最近下载:2025-05-15 人气:1559 磁力链接
  • mp4Course/8. Email/2. Creating your email.mp4 58.6 MB
  • mp4Course/5. Securing your computer/1. The basics of securing your computer.mp4 46.3 MB
  • mp4Course/4. Securing your Phone/4. Walkthrough Steps to take when downloading an app.mp4 41.6 MB
  • mp4Course/7. Surfing the Internet Securely/2. Google, Search, and Cookies.mp4 34.8 MB
  • mp4Course/5. Securing your computer/4. Non-obvious basic essentials for securing your computer.mp4 34.0 MB
  • mp4Course/6. Password and Accounts/4. Security questions & Birthday for your accounts.mp4 33.8 MB
  • mp4Course/7. Surfing the Internet Securely/3. Drive by downloads, HTTPs, and Internet Trackers.mp4 31.7 MB
  • mp4Course/4. Securing your Phone/9. Phishing attacks on your phone.mp4 29.3 MB
  • mp4Course/8. Email/4. Email activity.mp4 28.6 MB
  • mp4Course/5. Securing your computer/3. Protecting your home internet.mp4 26.0 MB
  • mp4Course/7. Surfing the Internet Securely/5. Google Maps and Child Filters.mp4 25.6 MB
  • mp4Course/3. Cyber Attacks/2. PhishingWhaling.mp4 24.6 MB
  • mp4Course/3. Cyber Attacks/4. Ransomware.mp4 24.0 MB
  • mp4Course/6. Password and Accounts/1. Rules for creating passwords.mp4 23.8 MB
  • mp4Course/4. Securing your Phone/3. Downloading Apps.mp4 23.2 MB
  • mp4Course/2. Mindset of Cybersecurity Professional/3. Convenience vs Friction.mp4 22.5 MB
  • mp4Course/2. Mindset of Cybersecurity Professional/5. Classifying your data.mp4 22.3 MB
  • mp4Course/4. Securing your Phone/7. Mobile Carrier Security.mp4 21.9 MB
  • mp4Course/4. Securing your Phone/6. Two Factor Authentication.mp4 19.2 MB
  • mp4Course/1. Introduction/1. Introduction - Getting Startaed.mp4 18.4 MB
共7页 上一页 1 2 3 4 5 6 下一页