为您索检到134条磁力链接,耗时0毫秒。
- 【影视】 Buried Hearts S01E02 Dongju Taken Out by Attackers After Securing Slush Funds 1080p DSNP WEB-DL AAC2 0 H 264-playWEB[EZTVx.to].mkv
-
收录时间:2025-03-13
文档个数:1
文档大小:2.1 GB
最近下载:2025-05-15
人气:1833
磁力链接
Buried Hearts S01E02 Dongju Taken Out by Attackers After Securing Slush Funds 1080p DSNP WEB-DL AAC2 0 H 264-playWEB[EZTVx.to].mkv 2.1 GB
猜你喜欢:
WEB
DL
AAC2
264
Securing
Dongju
Funds
Slush
After
DSNP
- 【影视】 DoctorAdventures: Kortney Kane & Madison Ivy (Securing the Will) [XXX] x264
-
收录时间:2025-02-18
文档个数:1
文档大小:561.6 MB
最近下载:2025-05-12
人气:20
磁力链接
da_kortney_madison_vl013114_480p_2000.mp4 561.6 MB
猜你喜欢:
Madison
XXX
Securing
Kane
Will
x264
DoctorAdventures
Ivy
Kortney
- 【影视】 Securing SQL Server Applications
-
收录时间:2024-12-30
文档个数:53
文档大小:268.3 MB
最近下载:2025-05-15
人气:1285
磁力链接
03. Auditing/02. Setting up SQL Server Auditing at the Instance Level.mp4 22.1 MB
03. Auditing/04. Reading and Interpreting Audit Logs.mp4 18.1 MB
04. Encryption in SQL Server/06. Using Always Encrypted.mp4 17.8 MB
sql-server-securing-applications.zip 17.0 MB
03. Auditing/01. Purpose and Advantages of Auditing and Logging.mp4 16.5 MB
04. Encryption in SQL Server/03. Encrypting Data in SQL Server.mp4 14.0 MB
06. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.mp4 13.4 MB
04. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.mp4 12.4 MB
02. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.mp4 12.2 MB
04. Encryption in SQL Server/05. Encrypting Data at Rest.mp4 11.2 MB
06. Tools for Compliance Regulations/05. Using SQL Server Ledger.mp4 11.0 MB
02. Introduction to Advanced Security Topics/01. SQL Server Security Overview.mp4 10.2 MB
04. Encryption in SQL Server/04. Encrypting Column Data.mp4 10.2 MB
05. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.mp4 9.4 MB
03. Auditing/03. Setting up SQL Server Auditing in a Database.mp4 8.7 MB
04. Encryption in SQL Server/02. Using Hash Functions for Password Storage.mp4 8.5 MB
05. Fighting SQL Injection Attacks/02. Real World Injection Threats.mp4 8.0 MB
06. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.mp4 7.8 MB
05. Fighting SQL Injection Attacks/01. Understanding SQL Injections.mp4 7.7 MB
05. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.mp4 6.5 MB
猜你喜欢:
Applications
Server
Securing
SQL
- 【影视】 Securing Generative AI
-
收录时间:2024-10-23
文档个数:34
文档大小:886.8 MB
最近下载:2025-05-16
人气:1388
磁力链接
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4 71.1 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 62.2 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.4 MB
Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.6 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.6 MB
Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.5 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.2 MB
Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
Introduction/001. Securing Generative AI Introduction.mp4 19.7 MB
Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.0 MB
猜你喜欢:
Generative
AI
Securing
- 【影视】 Securing Azure SQL Managed Instance
-
收录时间:2024-10-12
文档个数:10
文档大小:127.7 MB
最近下载:2025-05-15
人气:1764
磁力链接
03. Encryption and Data Privacy Measures/02. Data Privacy with Dynamic Data Masking and Row-level Security.mp4 23.4 MB
02. Advanced Security Features in Azure SQL Managed Instance/01. Auditing and Advanced Threat Protection.mp4 20.9 MB
01. Deployment and Connectivity Options under Security Isolation/02. Deployment Options for Secure Architecture.mp4 18.2 MB
03. Encryption and Data Privacy Measures/01. Implementing Encryption Policies.mp4 15.5 MB
02. Advanced Security Features in Azure SQL Managed Instance/02. Authentication and Authorization with Microsoft Entra.mp4 13.8 MB
01. Deployment and Connectivity Options under Security Isolation/03. Secure Connectivity Options.mp4 10.6 MB
01. Deployment and Connectivity Options under Security Isolation/01. Securing Azure SQL Managed Instance.mp4 10.0 MB
04. Best Practices and Special Considerations/01. Best Practices for Securing Azure SQL Managed Instance.mp4 6.0 MB
04. Best Practices and Special Considerations/02. Migrating and Restoring Encrypted Databases.mp4 5.1 MB
azure-sql-managed-instance-securing.zip 4.1 MB
猜你喜欢:
Azure
Instance
Managed
Securing
SQL
- 【影视】 Brazzers - DoctorAdventures - Kortney Kane & Madison Ivy (Securing the Will) -={SPARROW}=-
-
收录时间:2024-09-28
文档个数:4
文档大小:300.1 MB
最近下载:2025-04-04
人气:93
磁力链接
Brazzers - DoctorAdventures - Kortney Kane & Madison Ivy (Securing the Will) -={SPARROW}=-.mp4 299.7 MB
Torrent Uploaded By ShowStopper132203 aka SS132203.png 215.1 kB
-={ SPARROW }=-.jpg 110.7 kB
Torrent Downloaded From ExtraTorrent.cc.txt 3.4 kB
猜你喜欢:
Madison
Securing
SPARROW
Kane
Will
Brazzers
DoctorAdventures
Ivy
Kortney
- 【影视】 Securing Your Network from Attacks [CoursesGhar]
-
收录时间:2024-08-30
文档个数:47
文档大小:2.4 GB
最近下载:2025-04-20
人气:26
磁力链接
00008 Social_Engineering.mp4 142.2 MB
00028 Identifying_Phishing_Emails.mp4 106.6 MB
00009 Physical_Attacks.mp4 92.7 MB
00004 DOS_DDOS_Attacks.mp4 91.5 MB
00038 Damage_Control_and_Assessment.mp4 89.1 MB
00040 Developing_and_Learning_from_Your_Attack.mp4 86.7 MB
00039 Backup_and_Recovery.mp4 78.6 MB
00026 IP_What_is_IP_Addresses_Why_They_are_Important.mp4 76.9 MB
00029 Running_a_Phishing_Campaign.mp4 73.8 MB
00015 Employee_Reporting.mp4 72.9 MB
00005 A_Malicious_Hacker_s_Methodology.mp4 63.4 MB
00025 Network_Alert_Software_and_Monitoring_Meraki.mp4 63.4 MB
00003 Typical_Attacks_Against_a_Network.mp4 62.8 MB
00017 Antivirus_and_Console_Tools.mp4 61.0 MB
00012 What_is_an_Insider_Threat.mp4 60.5 MB
00018 Fake_Error_Messages_a_Look_at_Scareware_and_What_it_is.mp4 59.9 MB
00027 About_Phishing_Emails.mp4 59.4 MB
00037 Bitcoin_Tracking.mp4 58.9 MB
00023 Monitoring_Software.mp4 57.4 MB
00010 Getting_Sneaky_with_MiTM_and_DDOS_Attacks.mp4 54.7 MB
猜你喜欢:
Attacks
CoursesGhar
Your
Securing
Network
- 【影视】 B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4
-
收录时间:2024-08-04
文档个数:1
文档大小:1.1 GB
最近下载:2025-05-09
人气:21
磁力链接
B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4 1.1 GB
猜你喜欢:
Securing
Deal
GPNa8J
wIAA
720p
BBC
mp4
Ivy
buzzheavier
Ireland
- 【影视】 SheLovesBlack.24.04.11.Ivy.Ireland.Securing.A.Deal.XXX.720p.MP4-P2P[XC]
-
收录时间:2024-06-10
文档个数:2
文档大小:1.1 GB
最近下载:2025-05-16
人气:2526
磁力链接
shelovesblack.24.04.11.ivy.ireland.securing.a.deal.xxx.mp4 1.1 GB
Torrent Downloaded From XXXClub.to .nfo 34 Bytes
猜你喜欢:
11
XXX
Deal
Securing
24.04
SheLovesBlack
MP4
P2P
Ireland
XC
- 【影视】 New.Ivy.Ireland.Securing.A.Deal.2024.Hardcore.Roleplay.Black.ILUVY.mp4
-
收录时间:2024-06-06
文档个数:1
文档大小:559.2 MB
最近下载:2025-05-13
人气:775
磁力链接
New.Ivy.Ireland.Securing.A.Deal.2024.Hardcore.Roleplay.Black.ILUVY.mp4 559.2 MB
猜你喜欢:
Securing
Deal
ILUVY
2024
mp4
Black
Ireland
New
Hardcore
Ivy
- 【影视】 Securing Your GitHub Project
-
收录时间:2024-06-01
文档个数:46
文档大小:221.9 MB
最近下载:2025-05-15
人气:1669
磁力链接
03. Securing Your Development Workflow/04. Protecting GitHub Actions Secrets.mp4 21.7 MB
04. Discovering Vulnerabilities in Dependencies and Code/04. Discovering Vulnerabilities Using Static Analysis.mp4 18.6 MB
02. Safeguarding Access to Your GitHub Repository/02. Open Sourcing a JavaScript Library.mp4 17.4 MB
04. Discovering Vulnerabilities in Dependencies and Code/03. Patching Vulnerable Dependencies.mp4 17.0 MB
03. Securing Your Development Workflow/01. Hardening the GitHub Flow.mp4 14.4 MB
05. Publishing Security Fixes/02. Fixing the Code.mp4 12.9 MB
02. Safeguarding Access to Your GitHub Repository/07. Configuring Commit Signing Keys.mp4 11.8 MB
04. Discovering Vulnerabilities in Dependencies and Code/02. Managing Vulnerabilities in Dependencies.mp4 11.3 MB
03. Securing Your Development Workflow/02. Preventing Sensitive Data Leaks.mp4 11.3 MB
05. Publishing Security Fixes/03. Publishing the Fix.mp4 11.2 MB
05. Publishing Security Fixes/01. Vulnerabilities in Open Source Code.mp4 10.5 MB
04. Discovering Vulnerabilities in Dependencies and Code/01. Open Source Dependencies.mp4 9.5 MB
github-project-securing.zip 9.5 MB
02. Safeguarding Access to Your GitHub Repository/06. Configuring 2FA.mp4 8.5 MB
03. Securing Your Development Workflow/03. Recovering from Sensitive Data Leak.mp4 8.3 MB
02. Safeguarding Access to Your GitHub Repository/05. Protecting User Credentials.mp4 7.4 MB
02. Safeguarding Access to Your GitHub Repository/04. Using SSH Keys.mp4 6.8 MB
02. Safeguarding Access to Your GitHub Repository/03. Understanding Open Source Security.mp4 5.3 MB
01. Course Overview/01. Course Overview.mp4 3.1 MB
03. Securing Your Development Workflow/05. Summary.mp4 1.5 MB
猜你喜欢:
Project
GitHub
Your
Securing
- 【影视】 Securing a Kafka Cluster
-
收录时间:2024-04-23
文档个数:58
文档大小:513.7 MB
最近下载:2025-05-16
人气:2611
磁力链接
06. Authorizing Clients/06. Demo- Authorizing Kafka Connect.mp4 37.8 MB
05. Authenticating Clients/04. Demo- SASL PLAIN.mp4 37.4 MB
05. Authenticating Clients/09. Demo- SASL GSSAPI.mp4 37.3 MB
04. Encrypting Communication with Kafka/02. Demo- Kafka Clients TLS.mp4 35.9 MB
05. Authenticating Clients/05. SASL SCRAM.mp4 32.8 MB
05. Authenticating Clients/01. mTLS.mp4 31.7 MB
03. Encrypting Communication with Zookeeper/02. Demo- Zookeeper Quorum TLS.mp4 30.6 MB
04. Encrypting Communication with Kafka/05. Demo- End-to-end Encryption.mp4 29.8 MB
06. Authorizing Clients/04. Demo- Authorizing Producer and Consumer.mp4 25.9 MB
06. Authorizing Clients/05. Demo- Authorizing Kafka Streams.mp4 25.5 MB
06. Authorizing Clients/03. Demo- Setting up Authorization.mp4 25.3 MB
05. Authenticating Clients/06. SASL OAUTHBEARER.mp4 20.4 MB
03. Encrypting Communication with Zookeeper/03. Demo- Zookeeper Brokers TLS.mp4 18.5 MB
02. Handling Cryptography Containers/04. Demo- Creating Keystores and Truststores.mp4 13.7 MB
04. Encrypting Communication with Kafka/03. Demo- Inter Broker TLS.mp4 11.9 MB
securing-kafka-cluster.zip 10.0 MB
02. Handling Cryptography Containers/03. Public Key Infrastructure.mp4 9.9 MB
05. Authenticating Clients/08. Demo- Creating Kerberos Keytabs.mp4 9.6 MB
04. Encrypting Communication with Kafka/04. End-to-end Encryption.mp4 8.5 MB
05. Authenticating Clients/07. SASL GSSAPI and Delegation Token.mp4 8.4 MB
猜你喜欢:
Cluster
Securing
Kafka
- 【影视】 [ CourseWikia.com ] Linkedin - Securing the Use of Generative AI in Your Organization
-
收录时间:2024-03-06
文档个数:40
文档大小:205.2 MB
最近下载:2025-04-28
人气:420
磁力链接
~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/02 - Public AI Risk Mitigation.mp4 31.4 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/05 - Hallucinations.mp4 23.8 MB
~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/02 - Governance of Generative AI.mp4 17.9 MB
~Get Your Files Here !/01 - Introduction/02 - Security Challenges in Generative AI.mp4 16.9 MB
~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/01 - NIST AI Risk management Framework.mp4 14.5 MB
~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/03 - Writing your Generative AI Policy.mp4 13.6 MB
~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/03 - Introducing the MITIGATE AI Cyber framework.mp4 12.1 MB
~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/01 - Top threats presented by Public AI.mp4 10.0 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/01 - Data Poisoning and Prompt Injection Attacks.mp4 9.5 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/03 - Model poisoning and manipulation.mp4 8.7 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/06 - Inadequate sandboxing and malcious code execution.mp4 8.3 MB
~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/02 - AI browser plugin risk management.mp4 7.7 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/02 - Model Inversion and Data Leakage.mp4 7.4 MB
~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/01 - Ethical and Bias Considerations in Generative AI.mp4 6.6 MB
~Get Your Files Here !/06 - Conclusion/01 - Gen AI Fortified Your roadmap ahead.mp4 6.0 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/04 - Model and Stealing.mp4 6.0 MB
~Get Your Files Here !/01 - Introduction/01 - Introduction to Generative AI.mp4 4.8 MB
~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Apply the TRUSTED Framework.pdf 40.1 kB
~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Write your Gen AI policy.pdf 37.8 kB
~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/AI Browser Plugin and Extension Strategy and Plan.pdf 33.3 kB
猜你喜欢:
Use
Securing
AI
CourseWikia
Linkedin
Generative
Organization
com
Your
- 【影视】 [ FreeCourseWeb.com ] PluralSight - Securing Microservices in ASP.NET Core
-
收录时间:2024-02-26
文档个数:4977
文档大小:1.0 GB
最近下载:2025-05-14
人气:1083
磁力链接
~Get Your Files Here !/2. Securing Your First Microservice/12. Demo - Using the Identity Microservice to Log In.mp4 61.5 MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/6. Demo - Making the Gateway Responsible for Exchanging Tokens.mp4 55.9 MB
~Get Your Files Here !/7. Securing Async Service Communication/5. Demo - Sending and Validating a Token.mp4 54.5 MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/4. Demo - Configuring the Gateway for Scope-based Microservice Access Authorization.mp4 52.7 MB
~Get Your Files Here !/2. Securing Your First Microservice/10. Demo - Accessing a Microservice on Behalf of the Client Application.mp4 41.9 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/10. Demo - Service to Service Communication on Behal.mp4 37.2 MB
~Get Your Files Here !/2. Securing Your First Microservice/15. Demo - Accessing a Microservice on Behalf of the User.mp4 35.5 MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/6. Demo - Integrating Ocelot with Our Identity Service.mp4 31.8 MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/5. Demo - Adding Token Store Support for Custom Flows.mp4 30.6 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/9. Demo - Adding Support for the Token Exchange Gran.mp4 28.9 MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/5. Demo - Adding Ocelot.mp4 28.5 MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/8. Demo - Passing User Information to a Microservice.mp4 28.3 MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/3. Demo - Making Microservices Responsible for Validating Incoming Tokens.mp4 26.9 MB
~Get Your Files Here !/7. Securing Async Service Communication/4. Demo - Requesting a Token.mp4 25.7 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/6. Demo - Authorization with Scopes Inside of a Micr.mp4 24.6 MB
~Get Your Files Here !/2. Securing Your First Microservice/7. Demo - Inspecting an Identity Service.mp4 23.8 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/3. Demo - Tightening Access with One Audience per Mi.mp4 23.3 MB
~Get Your Files Here !/2. Securing Your First Microservice/9. Demo - Blocking Access to a Microservice.mp4 23.1 MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/3. Demo - Refreshing Tokens with IdentityModel.AspNetCore.mp4 22.3 MB
~Get Your Files Here !/7. Securing Async Service Communication/7. Demo - Dealing with Token Expiration.mp4 21.5 MB
猜你喜欢:
Microservices
PluralSight
ASP
Securing
Core
FreeCourseWeb
NET
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Securing Your Ubuntu Environment - Best Practices
-
收录时间:2024-02-17
文档个数:15
文档大小:352.3 MB
最近下载:2025-05-16
人气:4607
磁力链接
~Get Your Files Here !/1. Introduction/12. Backup.mp4 54.0 MB
~Get Your Files Here !/1. Introduction/2. Password Policy.mp4 53.4 MB
~Get Your Files Here !/1. Introduction/8. System Audit.mp4 46.1 MB
~Get Your Files Here !/1. Introduction/5. Firewall.mp4 45.3 MB
~Get Your Files Here !/1. Introduction/7. Disable Services.mp4 43.0 MB
~Get Your Files Here !/1. Introduction/9. Remove Unused Software.mp4 20.8 MB
~Get Your Files Here !/1. Introduction/3. Screen Lock.mp4 18.3 MB
~Get Your Files Here !/1. Introduction/4. Updates.mp4 18.2 MB
~Get Your Files Here !/2. Historical Security Bugs/1. Malicious Guest Session.mp4 17.8 MB
~Get Your Files Here !/1. Introduction/6. Only Trust the App Store.mp4 16.2 MB
~Get Your Files Here !/1. Introduction/11. Snap Permissions.mp4 11.1 MB
~Get Your Files Here !/1. Introduction/10. Web Browser.mp4 8.1 MB
~Get Your Files Here !/1. Introduction/1. Introduction.html 470 Bytes
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 182 Bytes
猜你喜欢:
Environment
Securing
Udemy
DevCourseWeb
Practices
Ubuntu
com
Your
Best
- 【影视】 05 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4
-
收录时间:2024-02-16
文档个数:1
文档大小:3.2 GB
最近下载:2025-05-09
人气:165
磁力链接
05 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4 3.2 GB
猜你喜欢:
Blue
Madison
Securing
05
Kane
Will
mp4
Mick
2014
Ivy
- 【影视】 [ TutPig.com ] Oreilly - Securing Your DevOps Pipelines
-
收录时间:2024-02-14
文档个数:35
文档大小:675.1 MB
最近下载:2025-05-15
人气:2515
磁力链接
~Get Your Files Here !/Lesson 3 DevSecOps Tools/005. 3.4 Use DAST tools.mp4 47.0 MB
~Get Your Files Here !/Lesson 5 Final Security Checks/003. 5.2 Use Kali Linux tools.mp4 41.5 MB
~Get Your Files Here !/Lesson 4 Setting up a DevSecOps Pipeline/006. 4.5 Add security to each step.mp4 41.2 MB
~Get Your Files Here !/Lesson 4 Setting up a DevSecOps Pipeline/005. 4.4 Break down the pipeline steps.mp4 38.2 MB
~Get Your Files Here !/Lesson 3 DevSecOps Tools/003. 3.2 Use SAST tools.mp4 36.1 MB
~Get Your Files Here !/Lesson 3 DevSecOps Tools/009. 3.8 Use OAST tools.mp4 35.0 MB
~Get Your Files Here !/Lesson 3 DevSecOps Tools/007. 3.6 Use IAST tools.mp4 33.6 MB
~Get Your Files Here !/Lesson 2 Security in DevOps or DevSecOps/004. 2.3 Learn the OWASP 10 top security risks.mp4 31.6 MB
~Get Your Files Here !/Lesson 5 Final Security Checks/005. 5.4 Perform compliance audits.mp4 29.6 MB
~Get Your Files Here !/Lesson 4 Setting up a DevSecOps Pipeline/004. 4.3 Write the CircleCI config.mp4 24.8 MB
~Get Your Files Here !/Lesson 1 Background on DevOps/003. 1.2 Learn how DevOps works.mp4 23.7 MB
~Get Your Files Here !/Lesson 1 Background on DevOps/004. 1.3 DevOps versus Waterfall.mp4 22.0 MB
~Get Your Files Here !/Lesson 3 DevSecOps Tools/004. 3.3 Learn about DAST.mp4 21.9 MB
~Get Your Files Here !/Lesson 3 DevSecOps Tools/008. 3.7 Learn about OAST.mp4 21.3 MB
~Get Your Files Here !/Lesson 3 DevSecOps Tools/006. 3.5 Learn about IAST.mp4 20.7 MB
~Get Your Files Here !/Lesson 3 DevSecOps Tools/002. 3.1 Learn about SAST.mp4 18.9 MB
~Get Your Files Here !/Lesson 2 Security in DevOps or DevSecOps/005. 2.4 Understand how attackers gain unauthorized access to apps.mp4 16.3 MB
~Get Your Files Here !/Introduction/001. Securing Your DevOps Pipelines Introduction.mp4 15.3 MB
~Get Your Files Here !/Lesson 2 Security in DevOps or DevSecOps/003. 2.2 Learn how issues get to production.mp4 15.0 MB
~Get Your Files Here !/Summary/001. Securing Your DevOps Pipelines Summary.mp4 14.2 MB
猜你喜欢:
Pipelines
Securing
DevOps
Your
TutPig
com
Oreilly
- 【影视】 [ DevCourseWeb.com ] Udemy - Cloud Security Fundamentals - Securing Your Cloud Journey
-
收录时间:2024-02-04
文档个数:8
文档大小:520.9 MB
最近下载:2025-05-16
人气:2388
磁力链接
~Get Your Files Here !/5 - Cloud Security Unique Challanges Part1.mp4 421.0 MB
~Get Your Files Here !/1 - Introduction.mp4 59.8 MB
~Get Your Files Here !/2 - Cloud Computing Service Models.mp4 14.2 MB
~Get Your Files Here !/6 - Cloud Security Unique Challanges Part2.mp4 11.4 MB
~Get Your Files Here !/3 - Technology That Makes Cloud Computing Possible.mp4 8.8 MB
~Get Your Files Here !/4 - Cloud Computing Deployment Models.mp4 5.7 MB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 182 Bytes
猜你喜欢:
Cloud
Securing
Fundamentals
Udemy
DevCourseWeb
Journey
Security
com
Your
- 【影视】 LinkedIn Learning - Node.js Securing RESTful APIs [CoursesGhar]
-
收录时间:2024-01-12
文档个数:43
文档大小:141.9 MB
最近下载:2025-04-10
人气:170
磁力链接
[4] 3. Securing the Node API [CoursesGhar.Com]/[3] Add the handlers for login.mp4 15.5 MB
[4] 3. Securing the Node API [CoursesGhar.Com]/[5] Add JWT setup into index.mp4 14.5 MB
[3] 2. Setting Up the Node API [CoursesGhar.Com]/[1] Base project template intro.mp4 12.3 MB
[4] 3. Securing the Node API [CoursesGhar.Com]/[4] Finalize secured endpoints.mp4 12.1 MB
[3] 2. Setting Up the Node API [CoursesGhar.Com]/[2] Finalize the setup for the project.mp4 11.9 MB
[4] 3. Securing the Node API [CoursesGhar.Com]/[2] Add the handlers for registration.mp4 11.4 MB
[2] 1. Setting Up [CoursesGhar.Com]/[2] Introduction to OWASP.mp4 10.8 MB
[4] 3. Securing the Node API [CoursesGhar.Com]/[6] Test the API with Postman.mp4 9.3 MB
[4] 3. Securing the Node API [CoursesGhar.Com]/[1] Add the handlers for loginRequired.mp4 7.3 MB
[3] 2. Setting Up the Node API [CoursesGhar.Com]/[4] Add bcrypt password hashing.mp4 6.9 MB
[3] 2. Setting Up the Node API [CoursesGhar.Com]/[3] Create the user model.mp4 5.7 MB
[1] Introduction [CoursesGhar.Com]/[1] Securing Node RESTful APIs.mp4 5.4 MB
[5] 4. Other Options [CoursesGhar.Com]/[1] Alternatives for securing APIs.mp4 4.5 MB
[2] 1. Setting Up [CoursesGhar.Com]/[4] Introduction to Postman.mp4 4.5 MB
[2] 1. Setting Up [CoursesGhar.Com]/[3] Introduction to JWT.mp4 4.3 MB
[2] 1. Setting Up [CoursesGhar.Com]/[1] Overview of the security threats.mp4 2.8 MB
[6] Conclusion [CoursesGhar.Com]/[1] Explore and build your skills.mp4 1.4 MB
[1] Introduction [CoursesGhar.Com]/[2] What you should know.mp4 1.2 MB
[3] 2. Setting Up the Node API [CoursesGhar.Com]/[1] Base project template intro.srt 9.5 kB
[3] 2. Setting Up the Node API [CoursesGhar.Com]/[2] Finalize the setup for the project.srt 8.9 kB
猜你喜欢:
Node
CoursesGhar
Securing
APIs
LinkedIn
js
Learning
RESTful
- 【影视】 [ DevCourseWeb.com ] Udemy - Hands-On ISA - IEC 62443 - Securing Industrial Systems
-
收录时间:2024-01-06
文档个数:86
文档大小:3.1 GB
最近下载:2025-05-16
人气:3070
磁力链接
~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/3. Threat Modeling - Lab.mp4 186.1 MB
~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/7. Security Requirements (HA Docker component) - Lab.mp4 182.6 MB
~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/12. Security Verification and Validation Testing - Lab.mp4 169.7 MB
~Get Your Files Here !/4. IEC 62443-4-1 Process development/5. Security Management - Lab.mp4 167.7 MB
~Get Your Files Here !/3. Prerequisites for preparing the certification/10. Security requirements. IEC 62443-3-3 & IEC 62443-4-2.mp4 156.3 MB
~Get Your Files Here !/4. IEC 62443-4-1 Process development/7. Specifying Security Requirements - Lab.mp4 147.9 MB
~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/1. Real Case - System Overview.mp4 122.6 MB
~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/8. Security Requirements (Water Valve component) - Lab.mp4 108.6 MB
~Get Your Files Here !/4. IEC 62443-4-1 Process development/13. Security Verification and Validation Testing - Lab.mp4 103.9 MB
~Get Your Files Here !/4. IEC 62443-4-1 Process development/15. Managing Security Issues - Lab.mp4 87.8 MB
~Get Your Files Here !/3. Prerequisites for preparing the certification/3. Create and configure the Jira project - Lab.mp4 86.2 MB
~Get Your Files Here !/3. Prerequisites for preparing the certification/9. Risk assessment. IEC 62443-3-2.mp4 82.6 MB
~Get Your Files Here !/4. IEC 62443-4-1 Process development/9. Secure Product Design - Lab.mp4 80.9 MB
~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/4. JIRA Requirements Bulk - Lab.mp4 71.7 MB
~Get Your Files Here !/4. IEC 62443-4-1 Process development/19. Providing Security User Documentation - Lab.mp4 70.2 MB
~Get Your Files Here !/4. IEC 62443-4-1 Process development/17. Releasing Security Updates - Lab.mp4 65.5 MB
~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/15. Providing Security User Documentation - Lab.mp4 63.2 MB
~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/6. Security Requirements (Raspberry component) - Lab.mp4 62.4 MB
~Get Your Files Here !/4. IEC 62443-4-1 Process development/12. Security Verification and Validation Testing.mp4 55.5 MB
~Get Your Files Here !/2. IEC 62443 Overview/11. Certifications.mp4 55.4 MB
猜你喜欢:
Industrial
Securing
Udemy
DevCourseWeb
Systems
Hands
ISA
com
IEC
62443