磁力管家

磁力管家
为您索检到3555条磁力链接,耗时26毫秒。 rss

分享给好友

【影视】 Brazzers - Xwife Karen, The Dan Dangler - Airport Security Leaves No Cock Unsucked (25.10.2024) rq.mp4
收录时间:2024-10-30 文档个数:1 文档大小:597.6 MB 最近下载:2025-05-16 人气:3121 磁力链接
  • mp4Brazzers - Xwife Karen, The Dan Dangler - Airport Security Leaves No Cock Unsucked (25.10.2024) rq.mp4 597.6 MB
【影视】 [ CourseWikia.com ] Linkedin - Understanding Google Cloud Security and Operations
收录时间:2024-02-17 文档个数:38 文档大小:187.4 MB 最近下载:2025-05-15 人气:3120 磁力链接
  • mp4~Get Your Files Here !/02 - 1. Module 1 Financial Governance in the Cloud/02 - Fundamentals of cloud cost management.mp4 20.3 MB
  • mp4~Get Your Files Here !/02 - 1. Module 1 Financial Governance in the Cloud/04 - Best practices for managing Google Cloud costs.mp4 16.3 MB
  • mp4~Get Your Files Here !/03 - 2. Module 2 Security in the Cloud/02 - Fundamental terms Privacy, security, compliance, and availability.mp4 14.5 MB
  • mp4~Get Your Files Here !/04 - 3. Module 3 Monitoring Cloud IT Services and Operations/02 - IT development and operations challenges.mp4 14.1 MB
  • mp4~Get Your Files Here !/04 - 3. Module 3 Monitoring Cloud IT Services and Operations/04 - Google Cloud resource monitoring tools.mp4 12.7 MB
  • mp4~Get Your Files Here !/03 - 2. Module 2 Security in the Cloud/03 - Today’s top cybersecurity challenges.mp4 12.3 MB
  • mp4~Get Your Files Here !/03 - 2. Module 2 Security in the Cloud/04 - Shared responsibility model Part 1.mp4 12.2 MB
  • mp4~Get Your Files Here !/04 - 3. Module 3 Monitoring Cloud IT Services and Operations/03 - DevOps and SRE.mp4 11.7 MB
  • mp4~Get Your Files Here !/03 - 2. Module 2 Security in the Cloud/07 - Resource hierarchy.mp4 11.3 MB
  • mp4~Get Your Files Here !/03 - 2. Module 2 Security in the Cloud/06 - Identity and access management.mp4 9.2 MB
  • mp4~Get Your Files Here !/03 - 2. Module 2 Security in the Cloud/05 - Shared responsibility model Part 2.mp4 9.0 MB
  • mp4~Get Your Files Here !/02 - 1. Module 1 Financial Governance in the Cloud/03 - Total cost of ownership.mp4 8.9 MB
  • pdf~Get Your Files Here !/Ex_Files__Security_Operations/libraries_gcp-ondemand-content_content_C-GCOPS-B_versions_2.0_revisions_1_resources_file-m0-r1-student-slides.pdf 8.0 MB
  • mp4~Get Your Files Here !/05 - Conclusion/01 - Summary.mp4 6.8 MB
  • mp4~Get Your Files Here !/02 - 1. Module 1 Financial Governance in the Cloud/01 - Introduction.mp4 6.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Course Introduction.mp4 6.5 MB
  • mp4~Get Your Files Here !/03 - 2. Module 2 Security in the Cloud/01 - Introduction.mp4 3.9 MB
  • mp4~Get Your Files Here !/04 - 3. Module 3 Monitoring Cloud IT Services and Operations/01 - Introduction.mp4 2.9 MB
  • pdf~Get Your Files Here !/Ex_Files__Security_Operations/libraries_gcp-ondemand-content_content_C-GCOPS-B_versions_2.0_revisions_1_resources_file-next.pdf 56.1 kB
  • srt~Get Your Files Here !/02 - 1. Module 1 Financial Governance in the Cloud/02 - Fundamentals of cloud cost management.srt 12.6 kB
【影视】 [ DevCourseWeb.com ] Udemy - Cyber Security Monitoring - Intrusion Detection System (IDS)
收录时间:2024-01-01 文档个数:58 文档大小:940.8 MB 最近下载:2025-05-15 人气:3119 磁力链接
  • mp4~Get Your Files Here !/3. Understanding the Network/5. Understanding Rules.mp4 69.9 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/8. Suricata - Learn and Understand Configuration.mp4 58.5 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/6. Introduction to Monitoring Consoles.mp4 55.0 MB
  • mp4~Get Your Files Here !/2. Getting Started/11. Section Summary.mp4 52.8 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/14. Understanding the Rules.mp4 40.1 MB
  • mp4~Get Your Files Here !/2. Getting Started/8. Understanding Samhain Configuration.mp4 37.5 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/2. Learn About Snort.mp4 36.7 MB
  • mp4~Get Your Files Here !/2. Getting Started/3. Learn About Configuration.mp4 34.6 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/3. Understanding Configuration.mp4 33.5 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/4. Understanding Usage.mp4 33.4 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/16. Summary.mp4 33.3 MB
  • mp4~Get Your Files Here !/2. Getting Started/9. Understanding Samhain Operation.mp4 33.2 MB
  • mp4~Get Your Files Here !/2. Getting Started/5. Introduction to OSSEC.mp4 33.0 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/7. Introduction to Suricata.mp4 32.4 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/13. Understanding the Usage.mp4 32.3 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/10. Suricata - Learn and Understand Rules.mp4 31.8 MB
  • mp4~Get Your Files Here !/2. Getting Started/7. Learn About Operation.mp4 31.5 MB
  • mp4~Get Your Files Here !/2. Getting Started/4. Learn and Understand Tripwire Operation.mp4 30.8 MB
  • mp4~Get Your Files Here !/3. Understanding the Network/1. Introduction.mp4 29.4 MB
  • mp4~Get Your Files Here !/2. Getting Started/6. Learn About Installation.mp4 28.4 MB
【影视】 [StationX] The Complete Cyber Security Course. Volumes 1-4 (2020) [En]
收录时间:2021-05-01 文档个数:3752 文档大小:14.2 GB 最近下载:2025-05-16 人气:3116 磁力链接
  • mp4The Complete Cyber Security Course Hackers Exposed/4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4 209.0 MB
  • mp4The Complete Cyber Security Course Anonymous Browsing/3. OPSEC (Operational Security)/6. 10 Rules of OPSEC.mp4 194.4 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 168.7 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4 151.2 MB
  • mp4The Complete Cyber Security Course Anonymous Browsing/16. Wrap Up/4. Firefox Hardening.mp4 149.2 MB
  • mp4The Complete Cyber Security Course Network Security/10. Browser Security and Tracking Prevention/18. Firefox Hardening.mp4 149.2 MB
  • mp4The Complete Cyber Security Course Anonymous Browsing/6. Tor/12. Conclusions on Tor and mitigation to reduce risk.mp4 128.6 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/4. Encryption Crash Course/7. SSL Stripping.mp4 120.1 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 118.9 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4 115.8 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 110.6 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/4. Encryption Crash Course/12. Steganography.mp4 109.4 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 103.2 MB
  • mp4The Complete Cyber Security Course Network Security/10. Browser Security and Tracking Prevention/16. Browser Fingerprinting.mp4 102.8 MB
  • mp4The Complete Cyber Security Course Network Security/3. Routers - Port and Vulnerability scanning/4. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS.mp4 101.1 MB
  • mp4The Complete Cyber Security Course Network Security/3. Routers - Port and Vulnerability scanning/3. External Vulnerability Scanning - Shodan, Qualys & Nmap.mp4 98.0 MB
  • mp4The Complete Cyber Security Course Network Security/7. Network Monitoring for Threats/5. Wireshark - Finding malware and hackers - Part 1.mp4 95.4 MB
  • mp4The Complete Cyber Security Course Network Security/8. How We Are Tracked Online/2. Types of Tracking.mp4 94.2 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/4. Encryption Crash Course/4. Hash Functions.mp4 93.6 MB
  • mp4The Complete Cyber Security Course Hackers Exposed/11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 92.9 MB
【影视】 [ FreeCourseWeb.com ] EC-Council - OWASP Top 10 Security Fundamentals
收录时间:2022-02-01 文档个数:35 文档大小:3.1 GB 最近下载:2025-05-15 人气:3116 磁力链接
  • mp4~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/12. Mitigation .mp4 162.0 MB
  • mp4~Get Your Files Here !/Chapter 9 Insecure Deserialization/26. Exploitation .mp4 159.6 MB
  • mp4~Get Your Files Here !/Chapter 7 Security Misconfiguration/21. Mitigation .mp4 151.5 MB
  • mp4~Get Your Files Here !/Chapter 6 Broken Access Control/18. Mitigation .mp4 135.5 MB
  • mp4~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/30. Mitigation .mp4 134.0 MB
  • mp4~Get Your Files Here !/Chapter 2 Injection Flaws/5. Exploitation .mp4 128.3 MB
  • mp4~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/29. Exploitation .mp4 126.8 MB
  • mp4~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/11. Exploitation .mp4 125.1 MB
  • mp4~Get Your Files Here !/Chapter 3 Broken Authentication/9. Mitigation .mp4 125.0 MB
  • mp4~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/23. Exploitation .mp4 118.9 MB
  • mp4~Get Your Files Here !/Chapter 7 Security Misconfiguration/20. Exploitation .mp4 115.3 MB
  • mp4~Get Your Files Here !/Chapter 1 World Wide Web Fundamentals/3. How the World Wide Web Works- .mp4 113.1 MB
  • mp4~Get Your Files Here !/Chapter 6 Broken Access Control/17. Exploitation .mp4 111.8 MB
  • mp4~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/33. Mitigation .mp4 109.4 MB
  • mp4~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/32. Exploitation .mp4 105.4 MB
  • mp4~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/24. Mitigation .mp4 93.5 MB
  • mp4~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/22. Threat Analysis .mp4 92.6 MB
  • mp4~Get Your Files Here !/Chapter 2 Injection Flaws/4. Threat Analysis .mp4 92.5 MB
  • mp4~Get Your Files Here !/Chapter 5 XML External Entities (XXE)/15. Mitigation .mp4 90.0 MB
  • mp4~Get Your Files Here !/Chapter 2 Injection Flaws/6. Mitigation .mp4 85.3 MB
【影视】 Border Security
收录时间:2018-10-17 文档个数:65 文档大小:29.3 GB 最近下载:2025-05-15 人气:3112 磁力链接
  • mp4Border Security - Canada Season 2/Border.Security.Canada.S02E03.HDTV.mp4 170.5 MB
  • mp4Border Security - Canada Season 2/Border.Security.Canada.S02E04.HDTV.mp4 154.9 MB
  • mp4Border Security - Canada Season 2/Border.Security.Canada.S02E26.Final.HDTV.mp4 153.8 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e01.hdtv.mp4 146.3 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e02.hdtv.mp4 145.4 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e05.hdtv.mp4 144.1 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e06.hdtv.mp4 158.0 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e07.hdtv.mp4 144.1 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e08.hdtv.mp4 146.5 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e09.hdtv.mp4 159.0 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e10.hdtv.mp4 150.7 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e11.hdtv.mp4 140.2 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e12.hdtv.mp4 156.5 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e13.hdtv.mp4 153.0 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e14.hdtv.mp4 165.6 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e15.hdtv.mp4 165.5 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e16.hdtv.mp4 148.4 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e17.hdtv.mp4 150.8 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e18.hdtv.mp4 155.8 MB
  • mp4Border Security - Canada Season 2/border.security.canada.s02e19.hdtv.mp4 146.9 MB
【影视】 【首发于高清影视之家 www.BBQDDQ.com】共同警备区[中文字幕].Joint.Security.Area.2000.BluRay.1080p.x265.10bit-MiniHD
收录时间:2024-06-01 文档个数:5 文档大小:3.8 GB 最近下载:2025-05-16 人气:3111 磁力链接
  • mkvJoint.Security.Area.2000.BluRay.1080p.x265.10bit-MiniHD.mkv 3.8 GB
  • MKV【更多无水印高清电影请访问 www.BBQDDQ.com】【更多无水印高清电影请访问 www.BBQDDQ.com】.MKV 637.0 kB
  • MP4【更多无水印蓝光原盘请访问 www.BBQDDQ.com】【更多无水印蓝光原盘请访问 www.BBQDDQ.com】.MP4 296.1 kB
  • DOC【更多无水印蓝光电影请访问 www.BBQDDQ.com】【更多无水印蓝光电影请访问 www.BBQDDQ.com】.DOC 296.1 kB
  • nfoJoint.Security.Area.2000.BluRay.1080p.x265.10bit-MiniHD.nfo 345 Bytes
【影视】 RestrainedElegance.2017.12.15.Security.Guards.XXX.1080p.MP4-hUSHhUSH[rarbg]
收录时间:2018-06-15 文档个数:3 文档大小:772.0 MB 最近下载:2025-05-16 人气:3100 磁力链接
  • txtRARBG.txt 30 Bytes
  • mp4RestrainedElegance.2017.12.15.Security.Guards.XXX.1080p.MP4-hUSHhUSH.mp4 771.9 MB
  • nforestrainedelegance.2017.12.15.security.guards.xxx.1080p.mp4-hushhush.nfo 19.4 kB
【影视】 Pluralsight - Managing Security in Google Cloud Platform by Google Cloud
收录时间:2021-03-13 文档个数:92 文档大小:424.3 MB 最近下载:2025-05-15 人气:3100 磁力链接
  • mp41. Foundations of GCP Security/4. Threats Mitigated by Google and GCP.mp4 41.4 MB
  • mp45. StackDriver and Scanning/11. Deploying and Using Forseti.mp4 22.4 MB
  • mp45. StackDriver and Scanning/8. Cloud Audit Logging.mp4 19.0 MB
  • mp42. Cloud Identity/6. Managing GCP Permissions and Groups.mp4 18.3 MB
  • zipmanaging-security-google-cloud-platform.zip 15.8 MB
  • mp44. VPCs for Isolation and Security/1. VPC Firewall Rules.mp4 15.4 MB
  • mp43. Identity and Access Management (IAM)/6. IAM Best Practices.mp4 15.0 MB
  • mp44. VPCs for Isolation and Security/9. Best Practices for VPC Networks.mp4 14.9 MB
  • mp44. VPCs for Isolation and Security/7. Interconnect and SSL Peering Options.mp4 14.9 MB
  • mp41. Foundations of GCP Security/2. VPC Network Security and Monitoring.mp4 14.4 MB
  • mp41. Foundations of GCP Security/1. Google Cloud Platform's Approach to Security.mp4 14.3 MB
  • mp45. StackDriver and Scanning/12. Course Review.mp4 12.3 MB
  • mp45. StackDriver and Scanning/2. Stackdriver components.mp4 12.1 MB
  • mp42. Cloud Identity/4. How Google Cloud Directory Sync Works.mp4 12.0 MB
  • mp44. VPCs for Isolation and Security/3. VPC Firewall Best Practices.mp4 11.8 MB
  • mp44. VPCs for Isolation and Security/6. Load Balancing and SSL Policies.mp4 11.8 MB
  • mp42. Cloud Identity/2. The Google Admin Console.mp4 11.6 MB
  • mp41. Foundations of GCP Security/3. GCP's Shared Security Model.mp4 10.9 MB
  • mp42. Cloud Identity/1. Cloud Identity Overview.mp4 10.8 MB
  • mp40. Welcome to Managing Security in Google Cloud Platform/0. Getting started with GCP and Qwiklabs.mp4 10.4 MB
【影视】 Gore Vidal's History of The National Security State
收录时间:2017-02-11 文档个数:10 文档大小:758.1 MB 最近下载:2025-05-16 人气:3092 磁力链接
  • aviAntonia Juhasz Part 1.avi 68.1 MB
  • aviAntonia Juhasz Part 2.avi 70.4 MB
  • aviAntonia Juhasz Part 3.avi 22.6 MB
  • aviGore Vidal.avi 193.4 MB
  • aviLawrence Wilkerson Part 1.avi 32.9 MB
  • aviLawrence Wilkerson Part 2.avi 49.6 MB
  • aviLawrence Wilkerson Part 3.avi 37.0 MB
  • aviRay McGovern Part 1.avi 123.9 MB
  • aviRay McGovern Part 2.avi 82.2 MB
  • aviRay McGovern Part 3.avi 78.0 MB
【影视】 UDEMY INFORMATION SECURITY CONCEPTS AND SECURE DESIGN PRINCIPLES TUTORIAL
收录时间:2017-02-16 文档个数:16 文档大小:362.8 MB 最近下载:2025-05-16 人气:3089 磁力链接
  • mp41_-_Course_Introduction_and_Topics/1_-_Course_Introduction_and_Topics_overview.mp4 4.9 MB
  • mp42_-_Importance_of_Information_Security_and_Basic_Security_Terminology/2_-_Importance_of_Information_Security.mp4 20.1 MB
  • mp42_-_Importance_of_Information_Security_and_Basic_Security_Terminology/3_-_Basic_Terminologies_in_Security.mp4 15.3 MB
  • mp43_-_C.I.A._Triad/10_-_Availability_and_DOS_DDOS_Attack.mp4 20.7 MB
  • mp43_-_C.I.A._Triad/7_-_TLS_SSL_Protocol_and_Handshake_Process.mp4 20.6 MB
  • mp43_-_C.I.A._Triad/5_-_Cryptography_Overview.mp4 18.5 MB
  • mp43_-_C.I.A._Triad/4_-_About_CIA_triad_and_Confidentiality.mp4 16.9 MB
  • mp43_-_C.I.A._Triad/6_-_Public_Key_Infrastructure_and_Digital_Certificate.mp4 15.7 MB
  • mp43_-_C.I.A._Triad/9_-_Hashing_and_Digital_Signature.mp4 14.6 MB
  • mp43_-_C.I.A._Triad/8_-_Integrity.mp4 13.2 MB
  • mp44_-_AAA_Authentication_Authorization_and_Accountability_concept/12_-_Password_Security.mp4 41.3 MB
  • mp44_-_AAA_Authentication_Authorization_and_Accountability_concept/14_-_Access_Control.mp4 38.4 MB
  • mp44_-_AAA_Authentication_Authorization_and_Accountability_concept/11_-_Authentication.mp4 31.7 MB
  • mp44_-_AAA_Authentication_Authorization_and_Accountability_concept/13_-_Authorization_and_Accountability.mp4 17.9 MB
  • mp45_-_Secure_Design_Principles/15_-_Secure_Design_Principles.mp4 48.3 MB
  • mp46_-_Course_Summary/16_-_Course_Summary.mp4 24.6 MB
【影视】 [FreeCoursesOnline.Me] Pluralsight - Elastic Stack Security Fundamentals
收录时间:2022-02-12 文档个数:299 文档大小:1.6 GB 最近下载:2025-05-15 人气:3087 磁力链接
  • mp403 - Perform Complex Search Functions in Kibana with Apache Lucene/2. Discovering the Functions of Lucene Query Syntax/4. Demo- Using Kibana with Apache Lucene to Perform Basic Search Functions.mp4 43.9 MB
  • mp403 - Perform Complex Search Functions in Kibana with Apache Lucene/3. Refine Search Results in Kibana with Lucene Query Syntax/3. Demo- Using Proximity, Range, Wildcard, and Existing Field Queries.mp4 36.5 MB
  • mp403 - Perform Complex Search Functions in Kibana with Apache Lucene/4. Using Regex, Boosting, and Fuzzy Searches in Kibana with Lucene/3. Demo- Using Fuzzy Searches,.mp4 34.8 MB
  • mp404 - Perform Index Management Tasks in Kibana/2. Achieving High Performance with Elasticsearch Indices/5. Understanding the Health Check Status.mp4 30.6 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/5. Using KQL Advanced Features in Querying Log Data/1. IP Address Searching in KQL.mp4 28.0 MB
  • mp401 - Elastic Stack - Getting Started/5. Using Analyzers in Elasticsearch/4. Creating a Custom Analyzer and Field Mapping.mp4 27.6 MB
  • mp405 - Perform Kibana Management Tasks/3. Visualizing Data in Kibana/3. Demo- Updating the Visualization Format.mp4 26.2 MB
  • mp407 - Installing the Elastic Stack/5. Collecting Logs from Windows Servers with Winlogbeat/4. Creating Winlogbeat Visualizations and Dashboards.mp4 25.4 MB
  • mp401 - Elastic Stack - Getting Started/4. Identifying Datatypes and Document Mappings in Elasticsearch/1. Introducing Data Types and Formats.mp4 24.0 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/3. Searching Logs Using KQL/4. KIbana Time Picker Functionality.mp4 22.0 MB
  • mp401 - Elastic Stack - Getting Started/3. Ingesting Data into Elasticsearch/3. A Practitioner's Look at Kibana.mp4 21.7 MB
  • mp404 - Perform Index Management Tasks in Kibana/4. Managing Index Lifecycle/2. Achieving Automated Index Rollover.mp4 21.6 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/5. Using KQL Advanced Features in Querying Log Data/3. Share and Inspect Saved Query.mp4 21.5 MB
  • mp406 - Build Visualizations and Dashboards in Kibana/2. Aggregating Data in Kibana/3. Demo- Creating a Metric and Bucket Aggregation.mp4 20.9 MB
  • mp401 - Elastic Stack - Getting Started/2. Detailing Elasticsearch Foundational Functions/3. Demonstrating Index and Document Concepts in Kibana.mp4 20.8 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/2. Identifying Core Kibana Components/2. Discover Application Features.mp4 20.7 MB
  • mp406 - Build Visualizations and Dashboards in Kibana/5. Creating Dashboards in Kibana/3. Navigating Between Dashboards Using Drilldown.mp4 20.1 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/4. Filtering and Grouping Logs Using KQL/2. KQL Boolean Query.mp4 18.8 MB
  • mp404 - Perform Index Management Tasks in Kibana/3. Optimizing Elastisearch Indices/4. Creating Explicit Mappings.mp4 18.5 MB
  • mp406 - Build Visualizations and Dashboards in Kibana/4. Performing Complex Visualizations in Kibana/4. Creating Geo Maps in Kibana.mp4 18.3 MB
【影视】 Security Onion
收录时间:2024-09-18 文档个数:95 文档大小:2.1 GB 最近下载:2025-05-16 人气:3082 磁力链接
  • mp4Security Onion 2020/Security Onion 2 Release Announcement and Live Demo.mp4 112.0 MB
  • mp4Security Onion 2017/State of the Onion by Doug Burks.mp4 73.8 MB
  • mp4Security Onion 2021/Developers Panel.mp4 69.1 MB
  • mp4Security Onion 2023/Achieving PEAK Performance Introducing the PEAK Threat Hunting Framework.mp4 66.0 MB
  • mp4Security Onion 2023/Security Onion Conference 2023 Keynote.mp4 65.5 MB
  • mp4Security Onion 2022/Detecting Suspicious Activity on Linux Endpoints Using Security Onion.mp4 64.6 MB
  • mp4Security Onion 2017/Orchestrating into SO-OODA by Rob Gresham.mp4 58.3 MB
  • mp4Security Onion 2021/Hunting Malware with Suricata Metadata by Josh Stroschein.mp4 57.3 MB
  • mp4Security Onion 2017/Pivoting Effectively to Catch More Bad Guys by Chris Sanders.mp4 56.6 MB
  • mp4Security Onion 2017/Snort - History and Vision by Joel Esler.mp4 53.8 MB
  • mp4Security Onion 2017/Building your Sec Ops Use Case by Don Murdoch.mp4 53.7 MB
  • mp4Security Onion 2018/Introduction to Data Analysis by David Bianco.mp4 51.2 MB
  • mp4Security Onion 2019/Augmenting the Onion by Wes Lambert.mp4 47.8 MB
  • mp4Security Onion 2021/Layers of Deception Intrusion Detection Honeypots w - Security Onion.mp4 47.5 MB
  • mp4Security Onion 2022/SOAR, SOC, and Scholars - How UofSC Develops its Security Operations Processes, Staff, and Students.mp4 46.2 MB
  • mp4Security Onion 2016/ICS SCADA Network Security Monitoring in Difficult Scenarios - Robert Lee.mp4 45.4 MB
  • mp4Security Onion 2018/Save Time with Modern Filtering Techniques by Mark Jeanmougin.mp4 44.6 MB
  • mp4Security Onion 2022/Tuning ICS Security Alerts An Alarm Management Approach.mp4 43.9 MB
  • mp4Security Onion 2018/State of the Onion by Doug Burks and Mike Reeves.mp4 43.6 MB
  • mp4Security Onion 2021/State of the Onion by Doug Burks.mp4 42.7 MB
【影视】 [ CourseMega.com ] Udemy - Cyber Security Class - Asset Security & Security Engineering
收录时间:2022-01-09 文档个数:392 文档大小:6.0 GB 最近下载:2025-05-16 人气:3065 磁力链接
  • mp4~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/9. Methods of Encryption Symmetric Cryptography.mp4 90.5 MB
  • mp4~Get Your Files Here !/6. Protecting Assets - Data Security Controls/14. Protecting Assets Understanding Configuration Management - 2.mp4 67.1 MB
  • mp4~Get Your Files Here !/10. Learning System & Computer Architecture/11. Section Outro.mp4 66.6 MB
  • mp4~Get Your Files Here !/2. Understanding Information Life Cycle/1. Introduction.mp4 63.7 MB
  • mp4~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/23. Methods of Encryption Hash Message Authentication Code.mp4 62.7 MB
  • mp4~Get Your Files Here !/6. Protecting Assets - Data Security Controls/13. Protecting Assets Understanding Configuration Management - 1.mp4 61.9 MB
  • mp4~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/7. Methods of Encryption Understanding Symmetric Algorithms.mp4 60.7 MB
  • mp4~Get Your Files Here !/6. Protecting Assets - Data Security Controls/12. Protecting Assets Learning System Configuration.mp4 60.4 MB
  • mp4~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/11. Methods of Encryption Exclusive OR (XOR).mp4 57.7 MB
  • mp4~Get Your Files Here !/10. Learning System & Computer Architecture/1. Introduction.mp4 56.1 MB
  • mp4~Get Your Files Here !/6. Protecting Assets - Data Security Controls/18. Protecting Assets Tools to Securely Delete Content.mp4 55.3 MB
  • mp4~Get Your Files Here !/6. Protecting Assets - Data Security Controls/19. Section Outro.mp4 54.3 MB
  • mp4~Get Your Files Here !/6. Protecting Assets - Data Security Controls/10. Protecting Assets Learn About ASD.mp4 52.4 MB
  • mp4~Get Your Files Here !/2. Understanding Information Life Cycle/2. Information Life Cycle The Valuable Information Assets - 1.mp4 51.9 MB
  • mp4~Get Your Files Here !/11. Learn and Understand Operating Systems/12. Section Outro.mp4 50.9 MB
  • mp4~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/11. Methods of Encryption Learning Asymmetric Key Algorithms.mp4 50.7 MB
  • mp4~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/11. Security Models Learning the Trusted Computing Base.mp4 50.5 MB
  • mp4~Get Your Files Here !/2. Understanding Information Life Cycle/3. Information Life Cycle The Valuable Information Assets - 2.mp4 50.1 MB
  • mp4~Get Your Files Here !/10. Learning System & Computer Architecture/8. System and Computer Architecture Memory Types - 3.mp4 49.8 MB
  • mp4~Get Your Files Here !/13. Understanding Information Systems Architecture/20. Learning Information Systems Architecture SSO For Web Applications.mp4 48.6 MB
【影视】 Bug Bounty A-Z - Ethical Hacking + Cyber Security Course
收录时间:2021-06-14 文档个数:274 文档大小:4.4 GB 最近下载:2025-05-14 人气:3064 磁力链接
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/10 SQL Injection/003 Vulnerability - Manual SQL Injection.mp4 190.1 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/05 Scanning the Target for valuable Information/003 Using Zenmap for Network Scanning.mp4 172.9 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/03 Setting up Penetration Testing Lab/005 How to install DVWA in Kali Linux.mp4 127.4 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/05 Scanning the Target for valuable Information/004 Using Nmap for Network Scanning.mp4 106.0 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/13 Password Cracking/002 Password Cracking using BurpSuite.mp4 99.5 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/17 Social Engineering - The Art of Human Exploitation/003 Practical - Using BEEF Project to get user credentials.mp4 94.3 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/17 Social Engineering - The Art of Human Exploitation/004 Practical - Using BEEF Project to get user credentials (Continued).mp4 93.5 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/11 Cross Site Scripting/003 Vulnerability - Intermediate Exploitation of Cross Site Scripting.mp4 89.8 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/09 File Upload Vulnerability/001 Configuring Burp Suite.mp4 85.4 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/03 Setting up Penetration Testing Lab/006 How to Install Metasploitable on Virtual Box.mp4 85.0 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/12 CSRF/002 CSRF Attack Practical.mp4 82.0 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/03 Setting up Penetration Testing Lab/008 Kali Linux - Execute Advance Commands.mp4 78.0 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/06 Vulnerability Assessment/005 Nessus - Analyse Results.mp4 77.0 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/06 Vulnerability Assessment/004 Nessus - Create and Configure a Policy.mp4 72.9 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/04 Information Gathering in Ethical Hacking/002 Information Gathering using Maltego Tool in Kali Linux.mp4 72.7 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/08 Command Execution Vulnerability/001 Vulnerability - Basic Command Execution.mp4 72.5 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/11 Cross Site Scripting/002 Vulnerability - Basic Exploitation of Cross Site Scripting.mp4 70.1 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/09 File Upload Vulnerability/002 Vulnerability - Basic File Upload Vulnerability.mp4 69.3 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/09 File Upload Vulnerability/003 Vulnerability - Advanced File Upload Vulnerability.mp4 68.0 MB
  • mp4[TutsNode.com] - Bug Bounty A-Z - Ethical Hacking + Cyber Security Course/07 OWASP Top 10/002 OWASP Top 10 Vulnerabilities - Part 2.mp4 66.6 MB
【影视】 www.torrenting.com - Security.2017.HDRip.XviD.AC3-EVO
收录时间:2017-07-04 文档个数:4 文档大小:1.5 GB 最近下载:2025-05-15 人气:3063 磁力链接
  • avisample.avi 71.0 MB
  • aviSecurity.2017.HDRip.XviD.AC3-EVO.avi 1.4 GB
  • nfoSecurity.2017.HDRip.XviD.AC3-EVO.nfo 611 Bytes
  • txtTorrent Downloaded From www.torrenting.com.txt 73 Bytes
【影视】 [ CourseBoat.com ] Udemy - Spring Security Zero to Master along with JWT,OAUTH2
收录时间:2022-01-17 文档个数:1227 文档大小:2.8 GB 最近下载:2025-05-15 人气:3062 磁力链接
  • mp4~Get Your Files Here !/13 - Implementing OAUTH2 style login inside EazyBank using KeyCloak/7 - Setup EazyBank Resource Server.mp4 105.0 MB
  • mp4~Get Your Files Here !/3 - Defining & Managing Users/7 - Deep Dive of UserDetailsManager Implementations.mp4 103.1 MB
  • mp4~Get Your Files Here !/12 - Implementing OAUTH2 using spring security/2 - Building a sample spring application that uses GitHub Auth server during OAUTH2.mp4 94.5 MB
  • mp4~Get Your Files Here !/13 - Implementing OAUTH2 style login inside EazyBank using KeyCloak/15 - Understanding PKCE Authorization code grant type inside Angular UI App.mp4 70.3 MB
  • mp4~Get Your Files Here !/3 - Defining & Managing Users/4 - Deep Dive of UserDetails Interface.mp4 65.1 MB
  • mp4~Get Your Files Here !/5 - Understanding Authentication Provider and Implementing it/3 - Understanding Authentication Provider definition.mp4 64.5 MB
  • mp4~Get Your Files Here !/3 - Defining & Managing Users/10 - Using JdbcUserDetailsManager to perform authentication.mp4 63.9 MB
  • mp4~Get Your Files Here !/8 - Filters in Spring Security/2 - Inbuilt Filters provided by Spring Security and validating them inside our app.mp4 61.2 MB
  • mp4~Get Your Files Here !/7 - Understanding & Implementing Authorization/4 - Configuring Authorities in Spring Security.mp4 60.0 MB
  • mp4~Get Your Files Here !/9 - Token based Authentication using JSON Web Token (JWT)/4 - Deep dive about JWT Tokens.mp4 57.1 MB
  • mp4~Get Your Files Here !/1 - Getting Started/4 - Creating a simple Spring security project.mp4 56.7 MB
  • mp4~Get Your Files Here !/8 - Filters in Spring Security/4 - Adding a custom filter using addFilterBefore() method.mp4 51.5 MB
  • mp4~Get Your Files Here !/4 - Password Management with PasswordEncoders/2 - Encoding Vs Encryption Vs Hashing.mp4 48.2 MB
  • mp4~Get Your Files Here !/3 - Defining & Managing Users/11 - Creating our own custom implementation of UserDetailsService.mp4 46.2 MB
  • mp4~Get Your Files Here !/13 - Implementing OAUTH2 style login inside EazyBank using KeyCloak/1 - Introduction to OAUTH2 flow inside EazyBank web App.mp4 45.1 MB
  • mp4~Get Your Files Here !/6 - Understanding CORs & CSRF/9 - Resolving CFRF error by generating a CSRF token.mp4 44.5 MB
  • mp4~Get Your Files Here !/8 - Filters in Spring Security/7 - Details about GenericFilterBean and OncePerRequestFilter.mp4 41.4 MB
  • mp4~Get Your Files Here !/5 - Understanding Authentication Provider and Implementing it/4 - Understanding Authentication & Principal Interfaces.mp4 40.5 MB
  • mp4~Get Your Files Here !/6 - Understanding CORs & CSRF/2 - Understanding the UI project and walkthrough of the Angular code.mp4 40.2 MB
  • mp4~Get Your Files Here !/10 - Method Level Security/3 - Implementing method level security using preauthorize and postauthorize.mp4 39.9 MB
【影视】 Border.Security.Canadas.Front.Line.S03.720p.HDTV.x264-NTb[rartv]
收录时间:2017-02-22 文档个数:28 文档大小:17.1 GB 最近下载:2025-04-29 人气:3059 磁力链接
  • nfoBorder.Security.Canadas.Front.Line.S03.720p.HDTV.x264-NTb.nfo 3.6 kB
  • mkvBorder.Security.Canadas.Front.Line.S03E01.720p.HDTV.x264-NTb.mkv 572.0 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E02.720p.HDTV.x264-NTb.mkv 601.2 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E03.720p.HDTV.x264-NTb.mkv 581.1 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E04.720p.HDTV.x264-NTb.mkv 579.2 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E05.720p.HDTV.x264-NTb.mkv 593.6 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E06.720p.HDTV.x264-NTb.mkv 587.8 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E07.720p.HDTV.x264-NTb.mkv 564.5 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E08.720p.HDTV.x264-NTb.mkv 621.6 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E09.720p.HDTV.x264-NTb.mkv 656.8 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E10.720p.HDTV.x264-NTb.mkv 624.4 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E11.720p.HDTV.x264-NTb.mkv 551.8 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E12.720p.HDTV.x264-NTb.mkv 580.2 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E13.720p.HDTV.x264-NTb.mkv 556.0 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E14.720p.HDTV.x264-NTb.mkv 599.9 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E15.720p.HDTV.x264-NTb.mkv 738.0 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E16.720p.HDTV.x264-NTb.mkv 728.7 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E17.720p.HDTV.x264-NTb.mkv 818.3 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E18.720p.HDTV.x264-NTb.mkv 770.7 MB
  • mkvBorder.Security.Canadas.Front.Line.S03E19.720p.HDTV.x264-NTb.mkv 721.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - SAP Fiori Security and Administration
收录时间:2024-04-28 文档个数:22 文档大小:2.2 GB 最近下载:2025-05-14 人气:3043 磁力链接
  • mp4~Get Your Files Here !/3. Fiori Application Security/2. Understanding Fiori Authorization flow - Using Practical Example of a Fiori App.mp4 330.3 MB
  • mp4~Get Your Files Here !/1. Introduction to FIORI/4. Fiori Apps Library.mp4 204.0 MB
  • mp4~Get Your Files Here !/4. Troubleshooting & Miscellaneous/1. Fiori Useful Transactions.mp4 188.2 MB
  • mp4~Get Your Files Here !/3. Fiori Application Security/3. UI Layer, Tiles, TM, Apps & Catalog (Technical & Business).mp4 162.9 MB
  • mp4~Get Your Files Here !/3. Fiori Application Security/4. Custom Catalog by copying Standard SAP Catalog.mp4 156.7 MB
  • mp4~Get Your Files Here !/2. Fiori End User & Admin Roles/1. Fiori End User Role (for Embedded Configuration).mp4 152.9 MB
  • mp4~Get Your Files Here !/2. Fiori End User & Admin Roles/3. Fiori Administrator Role (for Embedded & Gateway Configuration).mp4 142.9 MB
  • mp4~Get Your Files Here !/3. Fiori Application Security/6. Pages & Spaces.mp4 138.2 MB
  • mp4~Get Your Files Here !/2. Fiori End User & Admin Roles/2. Fiori End User Role (for Gateway Configuration).mp4 134.1 MB
  • mp4~Get Your Files Here !/3. Fiori Application Security/5. Custom Catalog Continue - Using Launcpad Designer.mp4 118.3 MB
  • mp4~Get Your Files Here !/1. Introduction to FIORI/2. What is Fiori & Fiori Launchpad (FLP) Demo.mp4 96.2 MB
  • mp4~Get Your Files Here !/3. Fiori Application Security/7. Pages & Spaces - Continue.mp4 78.0 MB
  • mp4~Get Your Files Here !/4. Troubleshooting & Miscellaneous/2. Fiori Useful Transactions - Continue.mp4 50.0 MB
  • mp4~Get Your Files Here !/1. Introduction to FIORI/3. A Breif History of SAP Fiori.mp4 49.6 MB
  • mp4~Get Your Files Here !/4. Troubleshooting & Miscellaneous/3. Scopes in Fiori.mp4 44.1 MB
  • mp4~Get Your Files Here !/1. Introduction to FIORI/1. Overview of course.mp4 41.2 MB
  • mp4~Get Your Files Here !/3. Fiori Application Security/1. Fiori Authorization flow.mp4 36.6 MB
  • mp4~Get Your Files Here !/1. Introduction to FIORI/6. Finding Fiori Configuration Details.mp4 28.4 MB
  • mp4~Get Your Files Here !/1. Introduction to FIORI/5. Fiori Deployment Options - Gateway vs Embedded.mp4 23.6 MB
  • docx~Get Your Files Here !/2. Fiori End User & Admin Roles/1.1 Fiori End User Services List.docx 14.1 kB
【影视】 Brazzers - Jennifer White - Blowing Off Her Security (23.10.2023) rq.mp4
收录时间:2023-12-25 文档个数:1 文档大小:458.6 MB 最近下载:2025-05-15 人气:3034 磁力链接
  • mp4Brazzers - Jennifer White - Blowing Off Her Security (23.10.2023) rq.mp4 458.6 MB
共178页 上一页 24 25 26 27 28 29 30 31 32 下一页