磁力管家

磁力管家
为您索检到134条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 Buried Hearts S01E02 Dongju Taken Out by Attackers After Securing Slush Funds 1080p DSNP WEB-DL AAC2 0 H 264-playWEB[EZTVx.to].mkv
收录时间:2025-03-13 文档个数:1 文档大小:2.1 GB 最近下载:2025-05-15 人气:1833 磁力链接
  • mkvBuried Hearts S01E02 Dongju Taken Out by Attackers After Securing Slush Funds 1080p DSNP WEB-DL AAC2 0 H 264-playWEB[EZTVx.to].mkv 2.1 GB
【影视】 DoctorAdventures: Kortney Kane & Madison Ivy (Securing the Will) [XXX] x264
收录时间:2025-02-18 文档个数:1 文档大小:561.6 MB 最近下载:2025-05-12 人气:20 磁力链接
  • mp4da_kortney_madison_vl013114_480p_2000.mp4 561.6 MB
【影视】 Securing SQL Server Applications
收录时间:2024-12-30 文档个数:53 文档大小:268.3 MB 最近下载:2025-05-15 人气:1285 磁力链接
  • mp403. Auditing/02. Setting up SQL Server Auditing at the Instance Level.mp4 22.1 MB
  • mp403. Auditing/04. Reading and Interpreting Audit Logs.mp4 18.1 MB
  • mp404. Encryption in SQL Server/06. Using Always Encrypted.mp4 17.8 MB
  • zipsql-server-securing-applications.zip 17.0 MB
  • mp403. Auditing/01. Purpose and Advantages of Auditing and Logging.mp4 16.5 MB
  • mp404. Encryption in SQL Server/03. Encrypting Data in SQL Server.mp4 14.0 MB
  • mp406. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.mp4 13.4 MB
  • mp404. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.mp4 12.4 MB
  • mp402. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.mp4 12.2 MB
  • mp404. Encryption in SQL Server/05. Encrypting Data at Rest.mp4 11.2 MB
  • mp406. Tools for Compliance Regulations/05. Using SQL Server Ledger.mp4 11.0 MB
  • mp402. Introduction to Advanced Security Topics/01. SQL Server Security Overview.mp4 10.2 MB
  • mp404. Encryption in SQL Server/04. Encrypting Column Data.mp4 10.2 MB
  • mp405. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.mp4 9.4 MB
  • mp403. Auditing/03. Setting up SQL Server Auditing in a Database.mp4 8.7 MB
  • mp404. Encryption in SQL Server/02. Using Hash Functions for Password Storage.mp4 8.5 MB
  • mp405. Fighting SQL Injection Attacks/02. Real World Injection Threats.mp4 8.0 MB
  • mp406. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.mp4 7.8 MB
  • mp405. Fighting SQL Injection Attacks/01. Understanding SQL Injections.mp4 7.7 MB
  • mp405. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.mp4 6.5 MB
【影视】 Securing Generative AI
收录时间:2024-10-23 文档个数:34 文档大小:886.8 MB 最近下载:2025-05-16 人气:1388 磁力链接
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4 71.1 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 62.2 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.4 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.6 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.6 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.5 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.2 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
  • mp4Introduction/001. Securing Generative AI Introduction.mp4 19.7 MB
  • mp4Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.0 MB
【影视】 Securing Azure SQL Managed Instance
收录时间:2024-10-12 文档个数:10 文档大小:127.7 MB 最近下载:2025-05-15 人气:1764 磁力链接
  • mp403. Encryption and Data Privacy Measures/02. Data Privacy with Dynamic Data Masking and Row-level Security.mp4 23.4 MB
  • mp402. Advanced Security Features in Azure SQL Managed Instance/01. Auditing and Advanced Threat Protection.mp4 20.9 MB
  • mp401. Deployment and Connectivity Options under Security Isolation/02. Deployment Options for Secure Architecture.mp4 18.2 MB
  • mp403. Encryption and Data Privacy Measures/01. Implementing Encryption Policies.mp4 15.5 MB
  • mp402. Advanced Security Features in Azure SQL Managed Instance/02. Authentication and Authorization with Microsoft Entra.mp4 13.8 MB
  • mp401. Deployment and Connectivity Options under Security Isolation/03. Secure Connectivity Options.mp4 10.6 MB
  • mp401. Deployment and Connectivity Options under Security Isolation/01. Securing Azure SQL Managed Instance.mp4 10.0 MB
  • mp404. Best Practices and Special Considerations/01. Best Practices for Securing Azure SQL Managed Instance.mp4 6.0 MB
  • mp404. Best Practices and Special Considerations/02. Migrating and Restoring Encrypted Databases.mp4 5.1 MB
  • zipazure-sql-managed-instance-securing.zip 4.1 MB
【影视】 Brazzers - DoctorAdventures - Kortney Kane & Madison Ivy (Securing the Will) -={SPARROW}=-
收录时间:2024-09-28 文档个数:4 文档大小:300.1 MB 最近下载:2025-04-04 人气:93 磁力链接
  • mp4Brazzers - DoctorAdventures - Kortney Kane & Madison Ivy (Securing the Will) -={SPARROW}=-.mp4 299.7 MB
  • pngTorrent Uploaded By ShowStopper132203 aka SS132203.png 215.1 kB
  • jpg-={ SPARROW }=-.jpg 110.7 kB
  • txtTorrent Downloaded From ExtraTorrent.cc.txt 3.4 kB
【影视】 Securing Your Network from Attacks [CoursesGhar]
收录时间:2024-08-30 文档个数:47 文档大小:2.4 GB 最近下载:2025-04-20 人气:26 磁力链接
  • mp400008 Social_Engineering.mp4 142.2 MB
  • mp400028 Identifying_Phishing_Emails.mp4 106.6 MB
  • mp400009 Physical_Attacks.mp4 92.7 MB
  • mp400004 DOS_DDOS_Attacks.mp4 91.5 MB
  • mp400038 Damage_Control_and_Assessment.mp4 89.1 MB
  • mp400040 Developing_and_Learning_from_Your_Attack.mp4 86.7 MB
  • mp400039 Backup_and_Recovery.mp4 78.6 MB
  • mp400026 IP_What_is_IP_Addresses_Why_They_are_Important.mp4 76.9 MB
  • mp400029 Running_a_Phishing_Campaign.mp4 73.8 MB
  • mp400015 Employee_Reporting.mp4 72.9 MB
  • mp400005 A_Malicious_Hacker_s_Methodology.mp4 63.4 MB
  • mp400025 Network_Alert_Software_and_Monitoring_Meraki.mp4 63.4 MB
  • mp400003 Typical_Attacks_Against_a_Network.mp4 62.8 MB
  • mp400017 Antivirus_and_Console_Tools.mp4 61.0 MB
  • mp400012 What_is_an_Insider_Threat.mp4 60.5 MB
  • mp400018 Fake_Error_Messages_a_Look_at_Scareware_and_What_it_is.mp4 59.9 MB
  • mp400027 About_Phishing_Emails.mp4 59.4 MB
  • mp400037 Bitcoin_Tracking.mp4 58.9 MB
  • mp400023 Monitoring_Software.mp4 57.4 MB
  • mp400010 Getting_Sneaky_with_MiTM_and_DDOS_Attacks.mp4 54.7 MB
【影视】 B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4
收录时间:2024-08-04 文档个数:1 文档大小:1.1 GB 最近下载:2025-05-09 人气:21 磁力链接
  • mp4B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4 1.1 GB
【影视】 SheLovesBlack.24.04.11.Ivy.Ireland.Securing.A.Deal.XXX.720p.MP4-P2P[XC]
收录时间:2024-06-10 文档个数:2 文档大小:1.1 GB 最近下载:2025-05-16 人气:2526 磁力链接
  • mp4shelovesblack.24.04.11.ivy.ireland.securing.a.deal.xxx.mp4 1.1 GB
  • nfoTorrent Downloaded From XXXClub.to .nfo 34 Bytes
【影视】 New.Ivy.Ireland.Securing.A.Deal.2024.Hardcore.Roleplay.Black.ILUVY.mp4
收录时间:2024-06-06 文档个数:1 文档大小:559.2 MB 最近下载:2025-05-13 人气:775 磁力链接
  • mp4New.Ivy.Ireland.Securing.A.Deal.2024.Hardcore.Roleplay.Black.ILUVY.mp4 559.2 MB
【影视】 Securing Your GitHub Project
收录时间:2024-06-01 文档个数:46 文档大小:221.9 MB 最近下载:2025-05-15 人气:1669 磁力链接
  • mp403. Securing Your Development Workflow/04. Protecting GitHub Actions Secrets.mp4 21.7 MB
  • mp404. Discovering Vulnerabilities in Dependencies and Code/04. Discovering Vulnerabilities Using Static Analysis.mp4 18.6 MB
  • mp402. Safeguarding Access to Your GitHub Repository/02. Open Sourcing a JavaScript Library.mp4 17.4 MB
  • mp404. Discovering Vulnerabilities in Dependencies and Code/03. Patching Vulnerable Dependencies.mp4 17.0 MB
  • mp403. Securing Your Development Workflow/01. Hardening the GitHub Flow.mp4 14.4 MB
  • mp405. Publishing Security Fixes/02. Fixing the Code.mp4 12.9 MB
  • mp402. Safeguarding Access to Your GitHub Repository/07. Configuring Commit Signing Keys.mp4 11.8 MB
  • mp404. Discovering Vulnerabilities in Dependencies and Code/02. Managing Vulnerabilities in Dependencies.mp4 11.3 MB
  • mp403. Securing Your Development Workflow/02. Preventing Sensitive Data Leaks.mp4 11.3 MB
  • mp405. Publishing Security Fixes/03. Publishing the Fix.mp4 11.2 MB
  • mp405. Publishing Security Fixes/01. Vulnerabilities in Open Source Code.mp4 10.5 MB
  • mp404. Discovering Vulnerabilities in Dependencies and Code/01. Open Source Dependencies.mp4 9.5 MB
  • zipgithub-project-securing.zip 9.5 MB
  • mp402. Safeguarding Access to Your GitHub Repository/06. Configuring 2FA.mp4 8.5 MB
  • mp403. Securing Your Development Workflow/03. Recovering from Sensitive Data Leak.mp4 8.3 MB
  • mp402. Safeguarding Access to Your GitHub Repository/05. Protecting User Credentials.mp4 7.4 MB
  • mp402. Safeguarding Access to Your GitHub Repository/04. Using SSH Keys.mp4 6.8 MB
  • mp402. Safeguarding Access to Your GitHub Repository/03. Understanding Open Source Security.mp4 5.3 MB
  • mp401. Course Overview/01. Course Overview.mp4 3.1 MB
  • mp403. Securing Your Development Workflow/05. Summary.mp4 1.5 MB
【影视】 Securing a Kafka Cluster
收录时间:2024-04-23 文档个数:58 文档大小:513.7 MB 最近下载:2025-05-16 人气:2611 磁力链接
  • mp406. Authorizing Clients/06. Demo- Authorizing Kafka Connect.mp4 37.8 MB
  • mp405. Authenticating Clients/04. Demo- SASL PLAIN.mp4 37.4 MB
  • mp405. Authenticating Clients/09. Demo- SASL GSSAPI.mp4 37.3 MB
  • mp404. Encrypting Communication with Kafka/02. Demo- Kafka Clients TLS.mp4 35.9 MB
  • mp405. Authenticating Clients/05. SASL SCRAM.mp4 32.8 MB
  • mp405. Authenticating Clients/01. mTLS.mp4 31.7 MB
  • mp403. Encrypting Communication with Zookeeper/02. Demo- Zookeeper Quorum TLS.mp4 30.6 MB
  • mp404. Encrypting Communication with Kafka/05. Demo- End-to-end Encryption.mp4 29.8 MB
  • mp406. Authorizing Clients/04. Demo- Authorizing Producer and Consumer.mp4 25.9 MB
  • mp406. Authorizing Clients/05. Demo- Authorizing Kafka Streams.mp4 25.5 MB
  • mp406. Authorizing Clients/03. Demo- Setting up Authorization.mp4 25.3 MB
  • mp405. Authenticating Clients/06. SASL OAUTHBEARER.mp4 20.4 MB
  • mp403. Encrypting Communication with Zookeeper/03. Demo- Zookeeper Brokers TLS.mp4 18.5 MB
  • mp402. Handling Cryptography Containers/04. Demo- Creating Keystores and Truststores.mp4 13.7 MB
  • mp404. Encrypting Communication with Kafka/03. Demo- Inter Broker TLS.mp4 11.9 MB
  • zipsecuring-kafka-cluster.zip 10.0 MB
  • mp402. Handling Cryptography Containers/03. Public Key Infrastructure.mp4 9.9 MB
  • mp405. Authenticating Clients/08. Demo- Creating Kerberos Keytabs.mp4 9.6 MB
  • mp404. Encrypting Communication with Kafka/04. End-to-end Encryption.mp4 8.5 MB
  • mp405. Authenticating Clients/07. SASL GSSAPI and Delegation Token.mp4 8.4 MB
【影视】 [ CourseWikia.com ] Linkedin - Securing the Use of Generative AI in Your Organization
收录时间:2024-03-06 文档个数:40 文档大小:205.2 MB 最近下载:2025-04-28 人气:420 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/02 - Public AI Risk Mitigation.mp4 31.4 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/05 - Hallucinations.mp4 23.8 MB
  • mp4~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/02 - Governance of Generative AI.mp4 17.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - Security Challenges in Generative AI.mp4 16.9 MB
  • mp4~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/01 - NIST AI Risk management Framework.mp4 14.5 MB
  • mp4~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/03 - Writing your Generative AI Policy.mp4 13.6 MB
  • mp4~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/03 - Introducing the MITIGATE AI Cyber framework.mp4 12.1 MB
  • mp4~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/01 - Top threats presented by Public AI.mp4 10.0 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/01 - Data Poisoning and Prompt Injection Attacks.mp4 9.5 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/03 - Model poisoning and manipulation.mp4 8.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/06 - Inadequate sandboxing and malcious code execution.mp4 8.3 MB
  • mp4~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/02 - AI browser plugin risk management.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/02 - Model Inversion and Data Leakage.mp4 7.4 MB
  • mp4~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/01 - Ethical and Bias Considerations in Generative AI.mp4 6.6 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Gen AI Fortified Your roadmap ahead.mp4 6.0 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/04 - Model and Stealing.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Introduction to Generative AI.mp4 4.8 MB
  • pdf~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Apply the TRUSTED Framework.pdf 40.1 kB
  • pdf~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Write your Gen AI policy.pdf 37.8 kB
  • pdf~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/AI Browser Plugin and Extension Strategy and Plan.pdf 33.3 kB
【影视】 [ FreeCourseWeb.com ] PluralSight - Securing Microservices in ASP.NET Core
收录时间:2024-02-26 文档个数:4977 文档大小:1.0 GB 最近下载:2025-05-14 人气:1083 磁力链接
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/12. Demo - Using the Identity Microservice to Log In.mp4 61.5 MB
  • mp4~Get Your Files Here !/5. Improving the API Gateway Pattern/6. Demo - Making the Gateway Responsible for Exchanging Tokens.mp4 55.9 MB
  • mp4~Get Your Files Here !/7. Securing Async Service Communication/5. Demo - Sending and Validating a Token.mp4 54.5 MB
  • mp4~Get Your Files Here !/5. Improving the API Gateway Pattern/4. Demo - Configuring the Gateway for Scope-based Microservice Access Authorization.mp4 52.7 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/10. Demo - Accessing a Microservice on Behalf of the Client Application.mp4 41.9 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/10. Demo - Service to Service Communication on Behal.mp4 37.2 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/15. Demo - Accessing a Microservice on Behalf of the User.mp4 35.5 MB
  • mp4~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/6. Demo - Integrating Ocelot with Our Identity Service.mp4 31.8 MB
  • mp4~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/5. Demo - Adding Token Store Support for Custom Flows.mp4 30.6 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/9. Demo - Adding Support for the Token Exchange Gran.mp4 28.9 MB
  • mp4~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/5. Demo - Adding Ocelot.mp4 28.5 MB
  • mp4~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/8. Demo - Passing User Information to a Microservice.mp4 28.3 MB
  • mp4~Get Your Files Here !/5. Improving the API Gateway Pattern/3. Demo - Making Microservices Responsible for Validating Incoming Tokens.mp4 26.9 MB
  • mp4~Get Your Files Here !/7. Securing Async Service Communication/4. Demo - Requesting a Token.mp4 25.7 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/6. Demo - Authorization with Scopes Inside of a Micr.mp4 24.6 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/7. Demo - Inspecting an Identity Service.mp4 23.8 MB
  • mp4~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/3. Demo - Tightening Access with One Audience per Mi.mp4 23.3 MB
  • mp4~Get Your Files Here !/2. Securing Your First Microservice/9. Demo - Blocking Access to a Microservice.mp4 23.1 MB
  • mp4~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/3. Demo - Refreshing Tokens with IdentityModel.AspNetCore.mp4 22.3 MB
  • mp4~Get Your Files Here !/7. Securing Async Service Communication/7. Demo - Dealing with Token Expiration.mp4 21.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Securing Your Ubuntu Environment - Best Practices
收录时间:2024-02-17 文档个数:15 文档大小:352.3 MB 最近下载:2025-05-16 人气:4607 磁力链接
  • mp4~Get Your Files Here !/1. Introduction/12. Backup.mp4 54.0 MB
  • mp4~Get Your Files Here !/1. Introduction/2. Password Policy.mp4 53.4 MB
  • mp4~Get Your Files Here !/1. Introduction/8. System Audit.mp4 46.1 MB
  • mp4~Get Your Files Here !/1. Introduction/5. Firewall.mp4 45.3 MB
  • mp4~Get Your Files Here !/1. Introduction/7. Disable Services.mp4 43.0 MB
  • mp4~Get Your Files Here !/1. Introduction/9. Remove Unused Software.mp4 20.8 MB
  • mp4~Get Your Files Here !/1. Introduction/3. Screen Lock.mp4 18.3 MB
  • mp4~Get Your Files Here !/1. Introduction/4. Updates.mp4 18.2 MB
  • mp4~Get Your Files Here !/2. Historical Security Bugs/1. Malicious Guest Session.mp4 17.8 MB
  • mp4~Get Your Files Here !/1. Introduction/6. Only Trust the App Store.mp4 16.2 MB
  • mp4~Get Your Files Here !/1. Introduction/11. Snap Permissions.mp4 11.1 MB
  • mp4~Get Your Files Here !/1. Introduction/10. Web Browser.mp4 8.1 MB
  • html~Get Your Files Here !/1. Introduction/1. Introduction.html 470 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 05 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4
收录时间:2024-02-16 文档个数:1 文档大小:3.2 GB 最近下载:2025-05-09 人气:165 磁力链接
  • mp405 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4 3.2 GB
【影视】 [ TutPig.com ] Oreilly - Securing Your DevOps Pipelines
收录时间:2024-02-14 文档个数:35 文档大小:675.1 MB 最近下载:2025-05-15 人气:2515 磁力链接
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/005. 3.4 Use DAST tools.mp4 47.0 MB
  • mp4~Get Your Files Here !/Lesson 5 Final Security Checks/003. 5.2 Use Kali Linux tools.mp4 41.5 MB
  • mp4~Get Your Files Here !/Lesson 4 Setting up a DevSecOps Pipeline/006. 4.5 Add security to each step.mp4 41.2 MB
  • mp4~Get Your Files Here !/Lesson 4 Setting up a DevSecOps Pipeline/005. 4.4 Break down the pipeline steps.mp4 38.2 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/003. 3.2 Use SAST tools.mp4 36.1 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/009. 3.8 Use OAST tools.mp4 35.0 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/007. 3.6 Use IAST tools.mp4 33.6 MB
  • mp4~Get Your Files Here !/Lesson 2 Security in DevOps or DevSecOps/004. 2.3 Learn the OWASP 10 top security risks.mp4 31.6 MB
  • mp4~Get Your Files Here !/Lesson 5 Final Security Checks/005. 5.4 Perform compliance audits.mp4 29.6 MB
  • mp4~Get Your Files Here !/Lesson 4 Setting up a DevSecOps Pipeline/004. 4.3 Write the CircleCI config.mp4 24.8 MB
  • mp4~Get Your Files Here !/Lesson 1 Background on DevOps/003. 1.2 Learn how DevOps works.mp4 23.7 MB
  • mp4~Get Your Files Here !/Lesson 1 Background on DevOps/004. 1.3 DevOps versus Waterfall.mp4 22.0 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/004. 3.3 Learn about DAST.mp4 21.9 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/008. 3.7 Learn about OAST.mp4 21.3 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/006. 3.5 Learn about IAST.mp4 20.7 MB
  • mp4~Get Your Files Here !/Lesson 3 DevSecOps Tools/002. 3.1 Learn about SAST.mp4 18.9 MB
  • mp4~Get Your Files Here !/Lesson 2 Security in DevOps or DevSecOps/005. 2.4 Understand how attackers gain unauthorized access to apps.mp4 16.3 MB
  • mp4~Get Your Files Here !/Introduction/001. Securing Your DevOps Pipelines Introduction.mp4 15.3 MB
  • mp4~Get Your Files Here !/Lesson 2 Security in DevOps or DevSecOps/003. 2.2 Learn how issues get to production.mp4 15.0 MB
  • mp4~Get Your Files Here !/Summary/001. Securing Your DevOps Pipelines Summary.mp4 14.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cloud Security Fundamentals - Securing Your Cloud Journey
收录时间:2024-02-04 文档个数:8 文档大小:520.9 MB 最近下载:2025-05-16 人气:2388 磁力链接
  • mp4~Get Your Files Here !/5 - Cloud Security Unique Challanges Part1.mp4 421.0 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 59.8 MB
  • mp4~Get Your Files Here !/2 - Cloud Computing Service Models.mp4 14.2 MB
  • mp4~Get Your Files Here !/6 - Cloud Security Unique Challanges Part2.mp4 11.4 MB
  • mp4~Get Your Files Here !/3 - Technology That Makes Cloud Computing Possible.mp4 8.8 MB
  • mp4~Get Your Files Here !/4 - Cloud Computing Deployment Models.mp4 5.7 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 LinkedIn Learning - Node.js Securing RESTful APIs [CoursesGhar]
收录时间:2024-01-12 文档个数:43 文档大小:141.9 MB 最近下载:2025-04-10 人气:170 磁力链接
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[3] Add the handlers for login.mp4 15.5 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[5] Add JWT setup into index.mp4 14.5 MB
  • mp4[3] 2. Setting Up the Node API [CoursesGhar.Com]/[1] Base project template intro.mp4 12.3 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[4] Finalize secured endpoints.mp4 12.1 MB
  • mp4[3] 2. Setting Up the Node API [CoursesGhar.Com]/[2] Finalize the setup for the project.mp4 11.9 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[2] Add the handlers for registration.mp4 11.4 MB
  • mp4[2] 1. Setting Up [CoursesGhar.Com]/[2] Introduction to OWASP.mp4 10.8 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[6] Test the API with Postman.mp4 9.3 MB
  • mp4[4] 3. Securing the Node API [CoursesGhar.Com]/[1] Add the handlers for loginRequired.mp4 7.3 MB
  • mp4[3] 2. Setting Up the Node API [CoursesGhar.Com]/[4] Add bcrypt password hashing.mp4 6.9 MB
  • mp4[3] 2. Setting Up the Node API [CoursesGhar.Com]/[3] Create the user model.mp4 5.7 MB
  • mp4[1] Introduction [CoursesGhar.Com]/[1] Securing Node RESTful APIs.mp4 5.4 MB
  • mp4[5] 4. Other Options [CoursesGhar.Com]/[1] Alternatives for securing APIs.mp4 4.5 MB
  • mp4[2] 1. Setting Up [CoursesGhar.Com]/[4] Introduction to Postman.mp4 4.5 MB
  • mp4[2] 1. Setting Up [CoursesGhar.Com]/[3] Introduction to JWT.mp4 4.3 MB
  • mp4[2] 1. Setting Up [CoursesGhar.Com]/[1] Overview of the security threats.mp4 2.8 MB
  • mp4[6] Conclusion [CoursesGhar.Com]/[1] Explore and build your skills.mp4 1.4 MB
  • mp4[1] Introduction [CoursesGhar.Com]/[2] What you should know.mp4 1.2 MB
  • srt[3] 2. Setting Up the Node API [CoursesGhar.Com]/[1] Base project template intro.srt 9.5 kB
  • srt[3] 2. Setting Up the Node API [CoursesGhar.Com]/[2] Finalize the setup for the project.srt 8.9 kB
【影视】 [ DevCourseWeb.com ] Udemy - Hands-On ISA - IEC 62443 - Securing Industrial Systems
收录时间:2024-01-06 文档个数:86 文档大小:3.1 GB 最近下载:2025-05-16 人气:3070 磁力链接
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/3. Threat Modeling - Lab.mp4 186.1 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/7. Security Requirements (HA Docker component) - Lab.mp4 182.6 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/12. Security Verification and Validation Testing - Lab.mp4 169.7 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/5. Security Management - Lab.mp4 167.7 MB
  • mp4~Get Your Files Here !/3. Prerequisites for preparing the certification/10. Security requirements. IEC 62443-3-3 & IEC 62443-4-2.mp4 156.3 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/7. Specifying Security Requirements - Lab.mp4 147.9 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/1. Real Case - System Overview.mp4 122.6 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/8. Security Requirements (Water Valve component) - Lab.mp4 108.6 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/13. Security Verification and Validation Testing - Lab.mp4 103.9 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/15. Managing Security Issues - Lab.mp4 87.8 MB
  • mp4~Get Your Files Here !/3. Prerequisites for preparing the certification/3. Create and configure the Jira project - Lab.mp4 86.2 MB
  • mp4~Get Your Files Here !/3. Prerequisites for preparing the certification/9. Risk assessment. IEC 62443-3-2.mp4 82.6 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/9. Secure Product Design - Lab.mp4 80.9 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/4. JIRA Requirements Bulk - Lab.mp4 71.7 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/19. Providing Security User Documentation - Lab.mp4 70.2 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/17. Releasing Security Updates - Lab.mp4 65.5 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/15. Providing Security User Documentation - Lab.mp4 63.2 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/6. Security Requirements (Raspberry component) - Lab.mp4 62.4 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/12. Security Verification and Validation Testing.mp4 55.5 MB
  • mp4~Get Your Files Here !/2. IEC 62443 Overview/11. Certifications.mp4 55.4 MB
共7页 上一页 1 2 3 4 5 下一页