磁力管家

磁力管家
为您索检到134条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [ DevCourseWeb.com ] Udemy - Securing Your Ubuntu Environment - Best Practices
收录时间:2024-02-17 文档个数:15 文档大小:352.3 MB 最近下载:2025-05-16 人气:4607 磁力链接
  • mp4~Get Your Files Here !/1. Introduction/12. Backup.mp4 54.0 MB
  • mp4~Get Your Files Here !/1. Introduction/2. Password Policy.mp4 53.4 MB
  • mp4~Get Your Files Here !/1. Introduction/8. System Audit.mp4 46.1 MB
  • mp4~Get Your Files Here !/1. Introduction/5. Firewall.mp4 45.3 MB
  • mp4~Get Your Files Here !/1. Introduction/7. Disable Services.mp4 43.0 MB
  • mp4~Get Your Files Here !/1. Introduction/9. Remove Unused Software.mp4 20.8 MB
  • mp4~Get Your Files Here !/1. Introduction/3. Screen Lock.mp4 18.3 MB
  • mp4~Get Your Files Here !/1. Introduction/4. Updates.mp4 18.2 MB
  • mp4~Get Your Files Here !/2. Historical Security Bugs/1. Malicious Guest Session.mp4 17.8 MB
  • mp4~Get Your Files Here !/1. Introduction/6. Only Trust the App Store.mp4 16.2 MB
  • mp4~Get Your Files Here !/1. Introduction/11. Snap Permissions.mp4 11.1 MB
  • mp4~Get Your Files Here !/1. Introduction/10. Web Browser.mp4 8.1 MB
  • html~Get Your Files Here !/1. Introduction/1. Introduction.html 470 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 Pluralsight - Securing Your AWS Cloud by AWS
收录时间:2021-03-30 文档个数:3 文档大小:356.9 MB 最近下载:2025-05-16 人气:4911 磁力链接
  • mp40. Securing Your AWS Cloud/0. Securing Your AWS Cloud.mp4 356.8 MB
  • srt0. Securing Your AWS Cloud/0. Securing Your AWS Cloud.srt 81.9 kB
  • txtcontent.txt 555 Bytes
【影视】 Ellie Idol - Securing My Position.1920x1080.mp4
收录时间:2018-09-20 文档个数:1 文档大小:1.3 GB 最近下载:2025-05-16 人气:1014 磁力链接
  • mp4Ellie Idol - Securing My Position.1920x1080.mp4 1.3 GB
【影视】 Pluralsight - Securing Applications on AWS by Mark Wilkins
收录时间:2021-04-27 文档个数:37 文档大小:329.9 MB 最近下载:2025-05-16 人气:1945 磁力链接
  • mp45.Auditing with CloudTrail/4.Analyzing CloudTrail Logs.mp4 18.1 MB
  • mp42.Web Application Firewall and the API Gateway/3.Conditions and Rules.mp4 17.8 MB
  • mp44.Logging with CloudWatch/8.Installing the CloudWatch Agent.mp4 16.5 MB
  • mp45.Auditing with CloudTrail/2.What Is CloudTrail.mp4 15.6 MB
  • mp46.Managing Compliance Standards with Trusted Advisor and AWS Config/6.Enable Managed Config Rules.mp4 15.5 MB
  • mp46.Managing Compliance Standards with Trusted Advisor and AWS Config/8.Notifications.mp4 14.7 MB
  • mp46.Managing Compliance Standards with Trusted Advisor and AWS Config/3.Trusted Advisor Benefits.mp4 14.4 MB
  • mp44.Logging with CloudWatch/3.CloudWatch Overview.mp4 13.9 MB
  • mp42.Web Application Firewall and the API Gateway/5.Creating a Geo Match Condition.mp4 12.7 MB
  • mp45.Auditing with CloudTrail/3.Creating Trails.mp4 12.5 MB
  • mp44.Logging with CloudWatch/7.Creating a CloudWatch Alarm.mp4 12.5 MB
  • mp43.Authenticating Users with Amazon Cognito/4.Creating a User Pool.mp4 12.1 MB
  • mp42.Web Application Firewall and the API Gateway/7.API Gateway Components.mp4 11.7 MB
  • mp44.Logging with CloudWatch/6.CloudTrail Events.mp4 11.6 MB
  • mp45.Auditing with CloudTrail/5.Monitoring Security Events with CloudTrail.mp4 11.5 MB
  • mp46.Managing Compliance Standards with Trusted Advisor and AWS Config/2.Trusted Advisor.mp4 11.5 MB
  • mp46.Managing Compliance Standards with Trusted Advisor and AWS Config/4.AWS Config.mp4 10.9 MB
  • mp42.Web Application Firewall and the API Gateway/2.Web Application Firewall.mp4 10.9 MB
  • mp43.Authenticating Users with Amazon Cognito/5.Create an Identity Pool.mp4 10.7 MB
  • mp42.Web Application Firewall and the API Gateway/6.API Gateway.mp4 7.7 MB
【影视】 Lynda - Laravel 5 Essential Training - 2 Testing, Securing, and Deploying
收录时间:2017-08-29 文档个数:4191 文档大小:209.9 MB 最近下载:2025-05-16 人气:2295 磁力链接
  • icoExercise Files/Chapter2/02_05/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter2/02_01/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter3/03_01/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter3/03_02/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter4/final_application/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter2/02_04/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Resources/initial_app/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter2/02_03/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter1/01_03/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter3/03_04/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter4/04_01/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter4/04_02/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter3/03_03/landon_app/public/favicon.ico 0 Bytes
  • icoExercise Files/Chapter2/02_02/landon_app/public/favicon.ico 0 Bytes
  • phpExercise Files/Chapter4/04_02/landon_app/resources/views/client/modify.blade.php 6 Bytes
  • phpExercise Files/Chapter3/03_01/landon_app/storage/framework/views/ccdc9a4c5f6031afc24e03056b2ae1fcff556133.php 6 Bytes
  • phpExercise Files/Chapter1/01_03/landon_app/resources/views/client/modify.blade.php 6 Bytes
  • phpExercise Files/Chapter4/final_application/resources/views/client/create.blade.php 6 Bytes
  • phpExercise Files/Chapter4/04_02/landon_app/storage/framework/views/ccdc9a4c5f6031afc24e03056b2ae1fcff556133.php 6 Bytes
  • phpExercise Files/Chapter3/03_03/landon_app/resources/views/client/modify.blade.php 6 Bytes
【影视】 Cassidy Klein - Primal Fetish - Securing Project Funding (2017).mp4
收录时间:2017-04-03 文档个数:1 文档大小:825.6 MB 最近下载:2025-05-16 人气:4620 磁力链接
  • mp4Cassidy Klein - Primal Fetish - Securing Project Funding (2017).mp4 825.6 MB
【影视】 Securing Generative AI
收录时间:2024-10-23 文档个数:34 文档大小:886.8 MB 最近下载:2025-05-16 人气:1388 磁力链接
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4 71.1 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 62.2 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.4 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.6 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.6 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.5 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.2 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
  • mp4Introduction/001. Securing Generative AI Introduction.mp4 19.7 MB
  • mp4Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.0 MB
【影视】 Securing a Kafka Cluster
收录时间:2024-04-23 文档个数:58 文档大小:513.7 MB 最近下载:2025-05-16 人气:2611 磁力链接
  • mp406. Authorizing Clients/06. Demo- Authorizing Kafka Connect.mp4 37.8 MB
  • mp405. Authenticating Clients/04. Demo- SASL PLAIN.mp4 37.4 MB
  • mp405. Authenticating Clients/09. Demo- SASL GSSAPI.mp4 37.3 MB
  • mp404. Encrypting Communication with Kafka/02. Demo- Kafka Clients TLS.mp4 35.9 MB
  • mp405. Authenticating Clients/05. SASL SCRAM.mp4 32.8 MB
  • mp405. Authenticating Clients/01. mTLS.mp4 31.7 MB
  • mp403. Encrypting Communication with Zookeeper/02. Demo- Zookeeper Quorum TLS.mp4 30.6 MB
  • mp404. Encrypting Communication with Kafka/05. Demo- End-to-end Encryption.mp4 29.8 MB
  • mp406. Authorizing Clients/04. Demo- Authorizing Producer and Consumer.mp4 25.9 MB
  • mp406. Authorizing Clients/05. Demo- Authorizing Kafka Streams.mp4 25.5 MB
  • mp406. Authorizing Clients/03. Demo- Setting up Authorization.mp4 25.3 MB
  • mp405. Authenticating Clients/06. SASL OAUTHBEARER.mp4 20.4 MB
  • mp403. Encrypting Communication with Zookeeper/03. Demo- Zookeeper Brokers TLS.mp4 18.5 MB
  • mp402. Handling Cryptography Containers/04. Demo- Creating Keystores and Truststores.mp4 13.7 MB
  • mp404. Encrypting Communication with Kafka/03. Demo- Inter Broker TLS.mp4 11.9 MB
  • zipsecuring-kafka-cluster.zip 10.0 MB
  • mp402. Handling Cryptography Containers/03. Public Key Infrastructure.mp4 9.9 MB
  • mp405. Authenticating Clients/08. Demo- Creating Kerberos Keytabs.mp4 9.6 MB
  • mp404. Encrypting Communication with Kafka/04. End-to-end Encryption.mp4 8.5 MB
  • mp405. Authenticating Clients/07. SASL GSSAPI and Delegation Token.mp4 8.4 MB
【影视】 SheLovesBlack.24.04.11.Ivy.Ireland.Securing.A.Deal.XXX.720p.MP4-P2P[XC]
收录时间:2024-06-10 文档个数:2 文档大小:1.1 GB 最近下载:2025-05-16 人气:2526 磁力链接
  • mp4shelovesblack.24.04.11.ivy.ireland.securing.a.deal.xxx.mp4 1.1 GB
  • nfoTorrent Downloaded From XXXClub.to .nfo 34 Bytes
【影视】 [FreeCoursesOnline.Me] Pluralsight - Securing the Application Lifecycle in Microsoft Azure
收录时间:2021-06-05 文档个数:37 文档大小:236.8 MB 最近下载:2025-05-16 人气:358 磁力链接
  • mp402 - Implementing Security Validations for Microsoft Azure Application Development/09 - Demo - Running Security Validation Tests (SVT) with AzSK.mp4 45.2 MB
  • mp402 - Implementing Security Validations for Microsoft Azure Application Development/07 - Demo - Preparing Resources for Security Testing .mp4 32.0 MB
  • mp403 - Deploying and Managing Synthetic Security Transactions in Microsoft Azure/17 - Demo - Load Testing Using Application Insights.mp4 28.7 MB
  • mp402 - Implementing Security Validations for Microsoft Azure Application Development/03 - Importance of Security Validations.mp4 26.4 MB
  • mp403 - Deploying and Managing Synthetic Security Transactions in Microsoft Azure/14 - Demo - Setting up a Test Application.mp4 14.5 MB
  • mp403 - Deploying and Managing Synthetic Security Transactions in Microsoft Azure/16 - Demo - Load Testing Using Azure DevOps.mp4 11.8 MB
  • mp403 - Deploying and Managing Synthetic Security Transactions in Microsoft Azure/18 - Summary.mp4 11.6 MB
  • mp403 - Deploying and Managing Synthetic Security Transactions in Microsoft Azure/15 - Demo - Load Testing Using Azure Portal.mp4 9.0 MB
  • mp402 - Implementing Security Validations for Microsoft Azure Application Development/08 - Demo - Finding Secrets in the Code with CredScan.mp4 8.8 MB
  • mp402 - Implementing Security Validations for Microsoft Azure Application Development/02 - Overview.mp4 8.6 MB
  • mp401 - Course Overview/01 - Course Overview.mp4 8.5 MB
  • mp403 - Deploying and Managing Synthetic Security Transactions in Microsoft Azure/13 - Load Testing Tools for Microsoft Azure.mp4 6.6 MB
  • mp402 - Implementing Security Validations for Microsoft Azure Application Development/04 - Managing Credentials in the Code with CredScan.mp4 5.8 MB
  • mp402 - Implementing Security Validations for Microsoft Azure Application Development/05 - Introducing Secure DevOps Kit for Azure (AzSK).mp4 5.0 MB
  • mp402 - Implementing Security Validations for Microsoft Azure Application Development/06 - Setting Up AzSK.mp4 3.5 MB
  • mp403 - Deploying and Managing Synthetic Security Transactions in Microsoft Azure/12 - Synthetic Web Transactions, Security, and Load Testing.mp4 3.5 MB
  • mp402 - Implementing Security Validations for Microsoft Azure Application Development/10 - Summary.mp4 2.8 MB
  • mp403 - Deploying and Managing Synthetic Security Transactions in Microsoft Azure/11 - Overview.mp4 2.3 MB
  • zipExercise Files.zip 2.0 MB
  • srt02 - Implementing Security Validations for Microsoft Azure Application Development/07 - Demo - Preparing Resources for Security Testing .en.srt 17.6 kB
【影视】 Pluralsight - Securing Your Application with OAuth and Passport
收录时间:2017-02-09 文档个数:28 文档大小:352.9 MB 最近下载:2025-05-16 人气:1960 磁力链接
  • mp401. Introduction/01_01-Introduction.mp4 2.5 MB
  • mp401. Introduction/01_02-What Is OAuth Anyway.mp4 9.3 MB
  • mp401. Introduction/01_03-Setting up Our Environment.mp4 11.2 MB
  • mp401. Introduction/01_04-Summary.mp4 1.8 MB
  • mp402. Sign in with Google/02_01-Introduction.mp4 1.8 MB
  • mp402. Sign in with Google/02_02-Setting up Passport Middleware.mp4 17.0 MB
  • mp402. Sign in with Google/02_03-Finding a Google Strategy.mp4 6.2 MB
  • mp402. Sign in with Google/02_04-Using the Google Strategy.mp4 10.2 MB
  • mp402. Sign in with Google/02_05-Setting up Your App with the Google Console.mp4 12.2 MB
  • mp402. Sign in with Google/02_06-Setting up Our Auth Routes.mp4 12.7 MB
  • mp402. Sign in with Google/02_07-Creating Our Views.mp4 19.2 MB
  • mp402. Sign in with Google/02_08-Summary.mp4 3.0 MB
  • mp403. Adding in More Providers/03_01-Introduction.mp4 1.3 MB
  • mp403. Adding in More Providers/03_02-Setting Our Code Up for Multiple Strategies.mp4 12.0 MB
  • mp403. Adding in More Providers/03_03-Securing Routes.mp4 4.1 MB
  • mp403. Adding in More Providers/03_04-Creating a User Object.mp4 8.1 MB
  • mp403. Adding in More Providers/03_05-Adding Twitter.mp4 23.6 MB
  • mp403. Adding in More Providers/03_06-Testing Twitter.mp4 9.8 MB
  • mp403. Adding in More Providers/03_07-Adding Facebook.mp4 20.5 MB
  • mp403. Adding in More Providers/03_08-Summary.mp4 2.2 MB
【影视】 Pluralsight - Securing AWS Networks by Saravanan Dhandapani
收录时间:2021-03-06 文档个数:23 文档大小:228.0 MB 最近下载:2025-05-16 人气:2791 磁力链接
  • mp42. Monitoring Security in AWS/2. AWS Config- Demo.mp4 20.7 MB
  • mp45. AWS Security Services/0. Amazon Macie- Theory and Demo.mp4 19.7 MB
  • mp42. Monitoring Security in AWS/3. VPC Flow Logs.mp4 17.1 MB
  • mp44. AWS Encryption Technologies/1. Encryption of Data at Rest- KMS and CloudHSM.mp4 15.6 MB
  • mp41. AWS Compliance/1. AWS Inspector- Theory and Demo.mp4 14.9 MB
  • mp43. Securing Data Flow/2. Network ACLs and Security Groups.mp4 13.4 MB
  • mp43. Securing Data Flow/3. Amazon Route 53.mp4 12.8 MB
  • mp43. Securing Data Flow/1. AWS WAF and Shield.mp4 12.4 MB
  • mp45. AWS Security Services/2. AWS Security Hub- Theory and Demo.mp4 11.9 MB
  • mp44. AWS Encryption Technologies/2. Encryption of Data in Transit.mp4 11.5 MB
  • mp42. Monitoring Security in AWS/0. AWS Shared Responsibility Model and Penetration Testing.mp4 10.1 MB
  • mp41. AWS Compliance/3. AWS Organizations and AWS Artifacts.mp4 8.4 MB
  • mp41. AWS Compliance/0. Security Perspective of Cloud Adoption Framework.mp4 7.5 MB
  • mp45. AWS Security Services/1. AWS Guard Duty- Theory and Demo.mp4 7.4 MB
  • mp44. AWS Encryption Technologies/0. Encryption Strategies- A Primer.mp4 7.1 MB
  • mp43. Securing Data Flow/0. AWS Edge Locations and Content Delivery.mp4 6.8 MB
  • mp41. AWS Compliance/2. AWS Trusted Advisor- Theory and Demo.mp4 6.5 MB
  • mp45. AWS Security Services/3. Amazon Detective and AWS Firewall Manager.mp4 6.0 MB
  • mp42. Monitoring Security in AWS/1. AWS Config- Theory.mp4 5.3 MB
  • mp43. Securing Data Flow/4. AWS Certificate Manager.mp4 5.0 MB
【影视】 Doctor Adventures - Kortney Kane, Madison Ivy { Securing the Will - 08.03.2014 - Brazzers } NEW August 03, 2014
收录时间:2017-03-24 文档个数:2 文档大小:299.7 MB 最近下载:2025-05-16 人气:1207 磁力链接
  • mp4da_kortney_madison_vl013114_480p_1000.mp4 299.7 MB
  • txtTorrent Downloaded from GloTorrents.com.txt 237 Bytes
【影视】 Udemy - WordPress Security - Securing your site quickly and easily
收录时间:2017-02-09 文档个数:24 文档大小:451.7 MB 最近下载:2025-05-16 人气:2001 磁力链接
  • mp404 Section 5 - Conclusion/001 Lecture 24 Conclusion.mp4 1.2 MB
  • mp403 Section 4 - Backups/002 Lecture 21 You have bacon on ice, but where do you want to store it.mp4 26.9 MB
  • mp403 Section 4 - Backups/003 Lecture 22 Backup Plugins will save you bacon.mp4 20.5 MB
  • mp403 Section 4 - Backups/004 Lecture 23 Oh No....it just happened, now what.mp4 24.8 MB
  • mp403 Section 4 - Backups/001 Lecture 20 Backups are useless....just kidding.mp4 26.2 MB
  • mp401 Section 1 - Are you afraid of Bears Just run faster than your neighbor/003 Lecture 3 So why are you they so threatening You need to understand them..mp4 28.9 MB
  • mp401 Section 1 - Are you afraid of Bears Just run faster than your neighbor/001 Lecture 1 If a bear is chasing you, do you stop or do you run faster.mp4 20.9 MB
  • mp401 Section 1 - Are you afraid of Bears Just run faster than your neighbor/002 Lecture 2 Do you think securing your WordPress site is worth it.mp4 14.3 MB
  • mp401 Section 1 - Are you afraid of Bears Just run faster than your neighbor/004 Lecture 4 So why are they attacking you You arent hurting anyone, right.mp4 32.5 MB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/011 Lecture 15 Backup strategy for your WordPress site.mp4 12.1 MB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/015 Lecture 19 Do you want a secure hosting provider or the one in a hostel.mp4 32.4 MB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/006 Lecture 10 Auto Updating your WordPress, it is easy peezy - DEMO.mp4 3.6 MB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/009 Lecture 13 Scanning your website for vulnerabilities, it must be done - DEMO.mp4 20.9 MB
  • pdf02 Section 2 - Securing WordPress in 30 Minutes or Less/013 Lecture 17 Secure Wordpress in 30 min or less - Checklist.pdf 925.1 kB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/004 Lecture 8 Creating something new, lets make it your Admin Account - DEMO.mp4 11.5 MB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/007 Lecture 11 Auto Updates of Themes Plugins and the deletion of plugins - DEMO.mp4 3.6 MB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/014 Lecture 18 Encryption Certificates, SSL and TLS...just do it.mp4 36.4 MB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/005 Lecture 9 Now it is out with the old and remove your Admin account - DEMO.mp4 6.3 MB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/008 Lecture 12 Installing Security Plugins, the right thing to do - DEMO.mp4 23.2 MB
  • mp402 Section 2 - Securing WordPress in 30 Minutes or Less/001 Lecture 5 Lets begin securing your WordPress site in 30 minutes.mp4 30.2 MB
【影视】 [ TutGator.com ] PluralSight - Securing REST Services Using Spring Security 5
收录时间:2023-12-18 文档个数:119 文档大小:735.3 MB 最近下载:2025-05-16 人气:2057 磁力链接
  • mp4~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/1. Introduction.mp4 53.6 MB
  • mp4~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.mp4 51.5 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.mp4 46.8 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.mp4 41.4 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.mp4 40.6 MB
  • mp4~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.mp4 39.9 MB
  • mp4~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.mp4 36.4 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.mp4 35.5 MB
  • mp4~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.mp4 24.1 MB
  • mp4~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.mp4 22.1 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.mp4 19.7 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.mp4 17.1 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.mp4 16.9 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.mp4 15.1 MB
  • mp4~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.mp4 13.5 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.mp4 13.4 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.mp4 12.8 MB
  • mp4~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.mp4 12.0 MB
  • mp4~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.mp4 11.7 MB
  • mp4~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.mp4 11.1 MB
【影视】 [Brazzers] (Kortney Kane, Madison Ivy) Securing the Will XXX (2014) (1080p HEVC)
收录时间:2023-12-24 文档个数:1 文档大小:818.4 MB 最近下载:2025-05-16 人气:3769 磁力链接
  • mp4[Brazzers] (Kortney Kane, Madison Ivy) Securing the Will XXX (2014) (1080p HEVC).mp4 818.4 MB
【影视】 [ TutGator.com ] Linkedin - CompTIA Network + (N10-008) Cert Prep - 5 Securing TCP - IP
收录时间:2022-04-23 文档个数:26 文档大小:1.1 GB 最近下载:2025-05-16 人气:2263 磁力链接
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/09 - Single sign-on.mp4 199.0 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/10 - Certificates and trust.mp4 171.5 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/05 - Identification.mp4 156.6 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/11 - Certificate error scenarios.mp4 98.7 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/08 - KerberosEAP.mp4 91.0 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/01 - Making TCPIP secure.mp4 80.0 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/02 - Symmetric encryption.mp4 66.3 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/07 - AAA.mp4 59.3 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/04 - Cryptographic hashes.mp4 56.5 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/06 - Access control.mp4 51.2 MB
  • mp4~Get Your Files Here !/01 - 1. Securing TCPIP/03 - Asymmetric encryption.mp4 38.3 MB
  • pdf~Get Your Files Here !/Ex_Files_CompTIA_Network_plus_N10_088_Cert_Prep_5/Exercise Files/Chapter 10 Slide Handouts.pdf 583.8 kB
  • jpg~Get Your Files Here !/01 - 1. Securing TCPIP/01 - Making TCPIP secure.mp4.jpg 247.2 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/10 - Certificates and trust.srt 25.4 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/09 - Single sign-on.srt 19.2 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/11 - Certificate error scenarios.srt 15.9 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/05 - Identification.srt 15.1 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/08 - KerberosEAP.srt 12.8 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/02 - Symmetric encryption.srt 9.7 kB
  • srt~Get Your Files Here !/01 - 1. Securing TCPIP/04 - Cryptographic hashes.srt 8.6 kB
【影视】 [ DevCourseWeb.com ] Udemy - Hands-On ISA - IEC 62443 - Securing Industrial Systems
收录时间:2024-01-06 文档个数:86 文档大小:3.1 GB 最近下载:2025-05-16 人气:3070 磁力链接
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/3. Threat Modeling - Lab.mp4 186.1 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/7. Security Requirements (HA Docker component) - Lab.mp4 182.6 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/12. Security Verification and Validation Testing - Lab.mp4 169.7 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/5. Security Management - Lab.mp4 167.7 MB
  • mp4~Get Your Files Here !/3. Prerequisites for preparing the certification/10. Security requirements. IEC 62443-3-3 & IEC 62443-4-2.mp4 156.3 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/7. Specifying Security Requirements - Lab.mp4 147.9 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/1. Real Case - System Overview.mp4 122.6 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/8. Security Requirements (Water Valve component) - Lab.mp4 108.6 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/13. Security Verification and Validation Testing - Lab.mp4 103.9 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/15. Managing Security Issues - Lab.mp4 87.8 MB
  • mp4~Get Your Files Here !/3. Prerequisites for preparing the certification/3. Create and configure the Jira project - Lab.mp4 86.2 MB
  • mp4~Get Your Files Here !/3. Prerequisites for preparing the certification/9. Risk assessment. IEC 62443-3-2.mp4 82.6 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/9. Secure Product Design - Lab.mp4 80.9 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/4. JIRA Requirements Bulk - Lab.mp4 71.7 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/19. Providing Security User Documentation - Lab.mp4 70.2 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/17. Releasing Security Updates - Lab.mp4 65.5 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/15. Providing Security User Documentation - Lab.mp4 63.2 MB
  • mp4~Get Your Files Here !/5. IEC 62443-4-2 - Practical case/6. Security Requirements (Raspberry component) - Lab.mp4 62.4 MB
  • mp4~Get Your Files Here !/4. IEC 62443-4-1 Process development/12. Security Verification and Validation Testing.mp4 55.5 MB
  • mp4~Get Your Files Here !/2. IEC 62443 Overview/11. Certifications.mp4 55.4 MB
【影视】 DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_1000).mp4
收录时间:2018-06-08 文档个数:1 文档大小:299.7 MB 最近下载:2025-05-16 人气:120 磁力链接
  • mp4DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_1000).mp4 299.7 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cloud Security Fundamentals - Securing Your Cloud Journey
收录时间:2024-02-04 文档个数:8 文档大小:520.9 MB 最近下载:2025-05-16 人气:2388 磁力链接
  • mp4~Get Your Files Here !/5 - Cloud Security Unique Challanges Part1.mp4 421.0 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 59.8 MB
  • mp4~Get Your Files Here !/2 - Cloud Computing Service Models.mp4 14.2 MB
  • mp4~Get Your Files Here !/6 - Cloud Security Unique Challanges Part2.mp4 11.4 MB
  • mp4~Get Your Files Here !/3 - Technology That Makes Cloud Computing Possible.mp4 8.8 MB
  • mp4~Get Your Files Here !/4 - Cloud Computing Deployment Models.mp4 5.7 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
共7页 上一页 1 2 3 4 5 下一页