磁力管家

磁力管家
为您索检到3555条磁力链接,耗时28毫秒。 rss

分享给好友

【影视】 Security.2017.SWESUB.720p.WEB-DL.x264-FiLMANTA
收录时间:2017-08-01 文档个数:1 文档大小:1.6 GB 最近下载:2024-08-08 人气:747 磁力链接
  • mp4Security.2017.SWESUB.720p.WEB-DL.x264-FiLMANTA.mp4 1.6 GB
【影视】 ST8 Adam & Paul- Airport Security.wmv
收录时间:2017-02-13 文档个数:1 文档大小:565.4 MB 最近下载:2025-05-13 人气:746 磁力链接
  • wmvST8 Adam & Paul- Airport Security.wmv 565.4 MB
【影视】 Lynda - CompTIA Security Exam Prep SY0 401 Part 1 Network Security
收录时间:2017-04-14 文档个数:30 文档大小:273.1 MB 最近下载:2024-11-23 人气:746 磁力链接
  • mp4011 Protocol analyzers.mp4 23.4 MB
  • mp4001 Welcome.mp4 20.1 MB
  • mp4013 Public and private addressing.mp4 13.2 MB
  • mp4022 Public cloud tiers.mp4 13.0 MB
  • mp4023 Firewall rule management.mp4 11.4 MB
  • mp4017 Remote network access.mp4 11.0 MB
  • mp4002 Introducing TCPIP.mp4 10.7 MB
  • mp4020 Virtualization.mp4 10.7 MB
  • mp4024 Router configuration security.mp4 10.1 MB
  • mp4016 Network access control.mp4 9.8 MB
  • mp4021 Cloud computing models.mp4 9.6 MB
  • mp4027 Network monitoring.mp4 8.9 MB
  • mp4007 Firewalls.mp4 8.8 MB
  • mp4005 ICMP.mp4 8.8 MB
  • mp4006 Switches and routers.mp4 8.4 MB
  • mp4004 Network ports.mp4 8.4 MB
  • mp4010 Network intrusion detection and prevention.mp4 8.2 MB
  • mp4008 Load balancers, proxies, and web security gateways.mp4 8.2 MB
  • mp4014 Subnetting.mp4 8.1 MB
  • mp4025 Switch configuration security.mp4 7.7 MB
【影视】 Security.2017.720p.Mozi+.WEB-DL.H264.HUN-Lajos32
收录时间:2024-07-03 文档个数:2 文档大小:690.7 MB 最近下载:2025-05-14 人气:744 磁力链接
  • mp4Security.2017.720p.Mozi+.WEB-DL.H264.HUN-Lajos32.mp4 690.7 MB
  • txtNFO.txt 2.9 kB
【影视】 [ WebToolTip.com ] Information Security Management - Strategic Budget
收录时间:2025-04-16 文档个数:32 文档大小:404.9 MB 最近下载:2025-05-15 人气:744 磁力链接
  • mp4~Get Your Files Here !/2-From Strategy to Security Controls/10 -Risk Assessments in Practice.mp4 22.8 MB
  • mp4~Get Your Files Here !/4-Prioritize and Refine/18 -Refine Budget.mp4 19.8 MB
  • mp4~Get Your Files Here !/5-Monitor and Adapt/24 -Post-mortem Analysis.mp4 19.3 MB
  • mp4~Get Your Files Here !/4-Prioritize and Refine/16 -Prioritize Expenses.mp4 16.0 MB
  • pdf~Get Your Files Here !/04/prioritize-and-refine-slides.pdf 15.9 MB
  • mp4~Get Your Files Here !/2-From Strategy to Security Controls/9 -Risk Assessments 101.mp4 15.5 MB
  • mp4~Get Your Files Here !/4-Prioritize and Refine/17 -Cost-benefit Analysis.mp4 15.5 MB
  • mp4~Get Your Files Here !/2-From Strategy to Security Controls/8 -Compliance Impact on Budget.mp4 15.4 MB
  • mp4~Get Your Files Here !/3-Budget Development/15 -Sizing Top-down.mp4 15.2 MB
  • pdf~Get Your Files Here !/05/monitor-and-adapt-slides.pdf 15.1 MB
  • mp4~Get Your Files Here !/4-Prioritize and Refine/19 -Present Budget.mp4 15.0 MB
  • mp4~Get Your Files Here !/3-Budget Development/12 -How Do You Develop a Budget.mp4 14.8 MB
  • mp4~Get Your Files Here !/5-Monitor and Adapt/21 -Budget Variance.mp4 14.4 MB
  • mp4~Get Your Files Here !/1-Security Budget and Its Role in the Enterprise/5 -CapEx vs. OpsEx.mp4 13.6 MB
  • pdf~Get Your Files Here !/02/from-strategy-to-security-controls-slides.pdf 13.6 MB
  • mp4~Get Your Files Here !/1-Security Budget and Its Role in the Enterprise/4 -Balance Sheet and Income Statement.mp4 13.5 MB
  • mp4~Get Your Files Here !/1-Security Budget and Its Role in the Enterprise/3 -Organizational Structures.mp4 13.3 MB
  • mp4~Get Your Files Here !/5-Monitor and Adapt/20 -Track and Monitor.mp4 13.0 MB
  • mp4~Get Your Files Here !/5-Monitor and Adapt/25 -Adapt and Improve.mp4 12.9 MB
  • pdf~Get Your Files Here !/03/budget-development-slides.pdf 12.2 MB
【影视】 National security - Sei in buone mani (2003).mkv
收录时间:2017-02-16 文档个数:1 文档大小:3.8 GB 最近下载:2025-02-23 人气:742 磁力链接
  • mkvNational security - Sei in buone mani (2003).mkv 3.8 GB
【影视】 linux-security-the-complete-iptables-firewall-guide
收录时间:2024-02-25 文档个数:873 文档大小:3.7 GB 最近下载:2025-05-13 人气:742 磁力链接
  • mp405 Iptables Basic Matches/028 Filter by Port.mp4 121.1 MB
  • mp407 Iptables Advanced Matches/045 The Limit Match.mp4 105.6 MB
  • mp415 Firewall Automation using Shell Scripts/094 Script the Automates Firewall Creation and Management.mp4 98.7 MB
  • mp403 The Iptables Command/010 Basic Usage.mp4 93.0 MB
  • mp410 Iptables Targets/068 Scanning Ports Using Nmap.mp4 90.7 MB
  • mp409 Advanced Firewall Configuration with Ipset/054 Ipset In Depth.mp4 90.1 MB
  • mp402 NetfilterIptables Basics/007 Netfilter Chains.mp4 85.5 MB
  • mp403 The Iptables Command/022 Loading the Firewall at Boot Time iptables-save and iptables-restore.mp4 84.1 MB
  • mp407 Iptables Advanced Matches/047 Building a Dynamic Database of Blacklisted IPs.mp4 77.6 MB
  • mp403 The Iptables Command/015 Append vs. Insert (A vs. I).mp4 74.9 MB
  • mp405 Iptables Basic Matches/024 Filter by IP Address.mp4 72.3 MB
  • mp410 Iptables Targets/070 REJECT.mp4 70.6 MB
  • mp402 NetfilterIptables Basics/008 Netfilter Tables.mp4 68.2 MB
  • mp403 The Iptables Command/012 Iptables Options (Flags) - Part 2.mp4 67.5 MB
  • mp407 Iptables Advanced Matches/042 Match by Date and Time.mp4 65.6 MB
  • mp403 The Iptables Command/014 Where Do We Write Iptables Rules.mp4 64.5 MB
  • mp409 Advanced Firewall Configuration with Ipset/061 Block Entire Countries Using Ipset.mp4 64.3 MB
  • mp413 User-defined Chains/085 Implementing User-defined Chains.mp4 62.4 MB
  • mp403 The Iptables Command/011 Iptables Options (Flags) - Part 1.mp4 61.0 MB
  • mp410 Iptables Targets/071 LOG.mp4 60.8 MB
【影视】 Security.2017.lati.mp4
收录时间:2021-03-07 文档个数:1 文档大小:1.6 GB 最近下载:2025-01-16 人气:740 磁力链接
  • mp4Security.2017.lati.mp4 1.6 GB
【影视】 Babes - Natalia Starr (Security) NEW 17 May 2015
收录时间:2017-03-02 文档个数:2 文档大小:401.4 MB 最近下载:2025-05-14 人气:738 磁力链接
  • nfoTorrent Downloaded From ExtraTorrent.cc.nfo 338 Bytes
  • mp4babes_bg_natalia_starr_sh031215_480p_1500.mp4 401.4 MB
【影视】 [Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course End Point Protection!
收录时间:2021-06-01 文档个数:1018 文档大小:3.0 GB 最近下载:2025-05-13 人气:736 磁力链接
  • mp48. Malware and Hacker Hunting on the End-Point/11. Windows - Malware Seek & Destroy - Process Monitor.mp4 79.9 MB
  • mp47. Threat Detection and Monitoring/4. CanaryTokens.mp4 73.7 MB
  • mp411. Email Security, Privacy and Anonymity/6. Windows - PGP & GPG.mp4 61.1 MB
  • mp48. Malware and Hacker Hunting on the End-Point/6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp4 60.6 MB
  • mp413. Wrap Up/3. Qubes OS.mp4 59.0 MB
  • mp48. Malware and Hacker Hunting on the End-Point/10. Windows - Malware Seek & Destroy - Autoruns.mp4 50.7 MB
  • mp48. Malware and Hacker Hunting on the End-Point/7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp4 49.0 MB
  • mp49. Operating System and Application Hardening/7. Windows - Security Compliance Manager (SCM).mp4 47.1 MB
  • mp41. Introduction/3. Security Quick Win!.mp4 46.8 MB
  • mp48. Malware and Hacker Hunting on the End-Point/15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp4 45.8 MB
  • mp48. Malware and Hacker Hunting on the End-Point/26. Mac, Linux & Windows - OSquery.mp4 44.4 MB
  • mp49. Operating System and Application Hardening/3. Hardening Standards.mp4 43.5 MB
  • mp48. Malware and Hacker Hunting on the End-Point/4. Automated Malware Removal Tools.mp4 41.9 MB
  • mp47. Threat Detection and Monitoring/5. OpenCanary.mp4 40.7 MB
  • mp43. File and Disk Encryption/4. Disk Encryption Attacks - Physical.mp4 40.2 MB
  • mp411. Email Security, Privacy and Anonymity/2. Clients, Protocols and Authentication.mp4 40.0 MB
  • mp48. Malware and Hacker Hunting on the End-Point/3. Windows - Farbar Recovery Scanner.mp4 39.9 MB
  • mp46. End-Point-Protection Technology/9. Windows - Exploitation Prevention - EMET.mp4 39.2 MB
  • mp411. Email Security, Privacy and Anonymity/16. Choosing an Email Provider.mp4 39.2 MB
  • mp44. Anti-Virus and End-Point-Protection/3. Is Anti-Virus dead - Protection Methods.mp4 38.4 MB
【影视】 390 - Certified Cloud Security Professional (CCSP)
收录时间:2021-04-09 文档个数:125 文档大小:8.1 GB 最近下载:2025-05-15 人气:735 磁力链接
  • mp4005 - Cloud Computing Activities and Service Categories.mp4 174.8 MB
  • mp4058 - Creating a BCDR Plan.mp4 155.1 MB
  • mp4047 - Environmental Design.mp4 154.1 MB
  • mp4026 - Encryption and Key Management.mp4 145.3 MB
  • mp4098 - Legal Frameworks and Guidelines.mp4 145.0 MB
  • mp4014 - Common Threats.mp4 144.6 MB
  • mp4020 - Verification Against Criteria.mp4 140.1 MB
  • mp4090 - Forensic Data Collection Methodologies.mp4 132.9 MB
  • mp4082 - Patch Management.mp4 123.1 MB
  • mp4059 - Testing a BCDR Plan.mp4 121.4 MB
  • mp4062 - Business Requirements and Phases_Methodologies.mp4 117.2 MB
  • mp4045 - Logical Design.mp4 108.8 MB
  • mp4004 - Roles, Characteristics and Building Block Technologies.mp4 108.7 MB
  • mp4077 - Secure Network Configuration.mp4 105.0 MB
  • mp4043 - Compute and Virtualization.mp4 103.1 MB
  • mp4016 - Cloud-Based Disaster Recovery (DR) and Business Continuity (BC).mp4 102.3 MB
  • mp4046 - Physical Design.mp4 99.0 MB
  • mp4080 - Availability of Clustered Hosts and Guest OSs.mp4 95.2 MB
  • mp4013 - Network Security and Virtualization Security.mp4 94.8 MB
  • mp4006 - Cloud Deployment Models.mp4 94.7 MB
【影视】 lynda.com - Foundations of Programming_ Web Security ® vampiri6ka
收录时间:2017-02-08 文档个数:51 文档大小:313.6 MB 最近下载:2025-05-10 人气:734 磁力链接
  • mp406 Encryption and User Authentication/38 Brute-force attacks.mp4 11.8 MB
  • mp404 Filtering Input, Controlling Output/18 Sanitizing data.mp4 10.9 MB
  • mp405 The Most Common Attacks/26 SQL injection.mp4 9.7 MB
  • mp406 Encryption and User Authentication/43 Multi-factor authentication.mp4 9.7 MB
  • mp404 Filtering Input, Controlling Output/17 Validating input.mp4 9.7 MB
  • mp405 The Most Common Attacks/25 Cross-site request forgery (CSRF).mp4 9.5 MB
  • mp405 The Most Common Attacks/30 Session hijacking.mp4 9.0 MB
  • mp406 Encryption and User Authentication/42 Handling forgotten passwords.mp4 8.7 MB
  • mp406 Encryption and User Authentication/36 Salting passwords.mp4 8.5 MB
  • mp405 The Most Common Attacks/28 Faked requests and forms.mp4 8.4 MB
  • mp405 The Most Common Attacks/27 URL manipulation.mp4 8.2 MB
  • mp404 Filtering Input, Controlling Output/21 Keeping credentials private.mp4 8.2 MB
  • mp404 Filtering Input, Controlling Output/23 Smart logging.mp4 8.0 MB
  • mp407 Other Areas of Concern/44 Credit card payments.mp4 7.9 MB
  • mp405 The Most Common Attacks/34 Denial of service.mp4 7.9 MB
  • mp407 Other Areas of Concern/48 Source code managers.mp4 7.7 MB
  • mp402 Security Overview/04 What is a hacker.mp4 7.6 MB
  • mp406 Encryption and User Authentication/39 Using SSL for login.mp4 7.5 MB
  • mp405 The Most Common Attacks/24 Cross-site scripting (XSS).mp4 7.4 MB
  • mp407 Other Areas of Concern/45 Regular expression flaws.mp4 7.4 MB
【影视】 Lynda Android Phone And Tablet Security Fundamentals -dbw-
收录时间:2017-02-14 文档个数:44 文档大小:323.4 MB 最近下载:2025-05-15 人气:732 磁力链接
  • mp44. Protecting a Device from Malware/1. Installing safe apps.mp4 61.6 MB
  • mp42. Protecting a Device from Direct Access/6. Connecting a device to a computer and encrypting data.mp4 23.4 MB
  • mp42. Protecting a Device from Direct Access/3. Controlling what is accessible on a locked device.mp4 19.4 MB
  • mp42. Protecting a Device from Direct Access/1. Setting up a screen lock.mp4 18.9 MB
  • mp42. Protecting a Device from Direct Access/2. Using Smart Lock.mp4 18.2 MB
  • mp42. Protecting a Device from Direct Access/4. Using alternative lock screens.mp4 17.9 MB
  • mp42. Protecting a Device from Direct Access/7. Locating and disabling a lost device.mp4 17.3 MB
  • mp43. Protecting Data Privacy/2. Understanding location privacy.mp4 17.3 MB
  • mp43. Protecting Data Privacy/1. Working with app privacy permissions.mp4 14.0 MB
  • mp41. Security Basics/2. Protecting passwords.mp4 12.6 MB
  • mp44. Protecting a Device from Malware/2. Controlling wireless network connections.mp4 12.5 MB
  • mp43. Protecting Data Privacy/4. Working privately in Chrome, YouTube, and Google Maps.mp4 12.1 MB
  • mp4Introduction/1. Welcome.mp4 11.7 MB
  • mp4Introduction/2. Note about software versions.mp4 11.2 MB
  • mp43. Protecting Data Privacy/3. Protecting location data on photos.mp4 10.6 MB
  • mp42. Protecting a Device from Direct Access/5. Understanding fingerprint locks.mp4 10.3 MB
  • mp44. Protecting a Device from Malware/3. Using security apps.mp4 9.4 MB
  • mp43. Protecting Data Privacy/5. Securing Dropbox and other apps and services.mp4 8.7 MB
  • mp41. Security Basics/4. Working with a Google Account.mp4 6.4 MB
  • mp41. Security Basics/3. Keeping software updated.mp4 4.1 MB
【影视】 Computer Security Hub
收录时间:2017-04-11 文档个数:340 文档大小:11.0 GB 最近下载:2025-05-09 人气:732 磁力链接
  • mp4Penetration Testing/Building a Virtual Lab with VirtualBox for Penetration Testing and Hacking Tests.mp4 1.4 GB
  • mp4Penetration Testing/Using Web Proxy Servers for Hacking.mp4 402.7 MB
  • mp4Penetration Testing/Hacking to Harvest User Login Credentials Off of the Network for Web Services Using Subterfuge.mp4 320.2 MB
  • mp4Windows Registry/Windows Registry Tutorial.mp4 286.1 MB
  • mp4Cryptography Courses/Extras and Lectures/Introduction to Public-Key Cryptography.mp4 228.9 MB
  • mp4Penetration Testing/Introduction to Phishing Email Hacking Attacks.mp4 220.3 MB
  • mp4Windows Registry/Hacking the Windows Registry.mp4 195.4 MB
  • mp4Penetration Testing/Disposable Email for Hacking and Security.mp4 189.6 MB
  • mp4Penetration Testing/Introduction to Hacking.mp4 187.2 MB
  • mp4Penetration Testing/Network Mapping.mp4 179.8 MB
  • mp4Penetration Testing/Hacking DNS.mp4 169.4 MB
  • mp4VBS Scripting/VBScript Basics » Part 6 _ Input Box.mp4 166.0 MB
  • mp4Penetration Testing/Introduction to Practical Hacking and Penetration Testing.mp4 157.9 MB
  • mp4Penetration Testing/Hacking - How to hack usernames and passwords - For Beginners.wmv.mp4 150.1 MB
  • mp4Penetration Testing/Step-byStep SQL Injection Attack.mp4 146.3 MB
  • mp4VBS Scripting/VBScript Basics » Part 25 _ Replace Command _ InputBox by Lines.mp4 134.7 MB
  • mp4VBS Scripting/VBScript Basics » Part 13 _ Automation_ Internet Explorer _ HTML.mp4 134.0 MB
  • mp4Penetration Testing/Hacking - How to hack a WPA_WPA2 Router - For Beginners.mp4 127.4 MB
  • mp4Cryptography Courses/Extras and Lectures/Theory and Practice of Cryptography.mp4 125.2 MB
  • mp4VBS Scripting/VBScript Basics » Part 2 _ Message Box - Constants.mp4 124.2 MB
【影视】 [ CourseLala.com ] Linkedin - Microsoft Azure Security Technologies (AZ-500) Cert Prep - 4 Secure Data and Applications
收录时间:2022-02-13 文档个数:41 文档大小:196.9 MB 最近下载:2025-05-15 人气:732 磁力链接
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[2] Configure Storage account access keys.mp4 19.9 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[2] Configure access to Azure Key Vault.mp4 18.1 MB
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[3] Configure Azure AD authentication for Azure Storage.mp4 16.3 MB
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[4] Azure AD Domain Services authentication for Azure Files.mp4 16.2 MB
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[1] Configure access control for Storage accounts.mp4 14.4 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[3] Manage certificates, secrets, and keys.mp4 14.2 MB
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[5] Configure delegated access.mp4 12.8 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[1] Enable database authentication using Azure AD.mp4 11.9 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[4] Implement database encryption for Azure SQL Database.mp4 10.8 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[3] Configure dynamic masking on SQL workloads.mp4 9.7 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[5] Implement network isolation for data solutions.mp4 9.3 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[2] Enable database auditing.mp4 9.2 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[5] Backup and recovery of certificates, secrets, and keys.mp4 9.0 MB
  • mp4~Get Your Files Here !/[1] Introduction/[1] Securing data and apps in Azure.mp4 6.5 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[1] Create and configure Key Vault.mp4 6.5 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[4] Configure key rotation.mp4 5.6 MB
  • mp4~Get Your Files Here !/[5] Conclusion/[1] Next steps.mp4 3.0 MB
  • mp4~Get Your Files Here !/[1] Introduction/[3] Exam overview.mp4 1.8 MB
  • mp4~Get Your Files Here !/[1] Introduction/[2] What you should know.mp4 1.5 MB
  • pdf~Get Your Files Here !/Ex_Files_MS_Azure_Security_Tech_Cert_Prep_4/Exercise Files/Exam Study Guide AZ-500 Course 4.pdf 57.4 kB
【影视】 [ TutGee.com ] Udemy - IoT(Internet of Things) Cyber Security and Risk management
收录时间:2022-02-23 文档个数:18 文档大小:359.0 MB 最近下载:2025-04-15 人气:732 磁力链接
  • mp4~Get Your Files Here !/2. IoT Device - Risk Mitigation/2. IoT - Challenges with Risk Mitigation part1.mp4 85.5 MB
  • mp4~Get Your Files Here !/3. IoT Device - Cyber Security for Manufacturer/3. IoT Devices - Cyber Security for Manufacturer - Post-market Phase.mp4 60.8 MB
  • mp4~Get Your Files Here !/3. IoT Device - Cyber Security for Manufacturer/1. IoT Devices - CyberSecurity for Manufacturer-Pre-market Phase Part1.mp4 60.3 MB
  • mp4~Get Your Files Here !/1. Introduction/2. Difference in IoT vs IT security & risk management.mp4 51.7 MB
  • mp4~Get Your Files Here !/3. IoT Device - Cyber Security for Manufacturer/2. IoT Devices - Cyber Security for Manufacturer - Pre-market Phase Part2.mp4 43.0 MB
  • mp4~Get Your Files Here !/2. IoT Device - Risk Mitigation/3. IoT - Challenges with Risk Mitigation part2.mp4 24.6 MB
  • mp4~Get Your Files Here !/2. IoT Device - Risk Mitigation/1. IoT - Risk Mitigation.mp4 20.6 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction to IoT Devices.mp4 12.3 MB
  • srt~Get Your Files Here !/2. IoT Device - Risk Mitigation/2. IoT - Challenges with Risk Mitigation part1.srt 15.5 kB
  • srt~Get Your Files Here !/1. Introduction/2. Difference in IoT vs IT security & risk management.srt 15.1 kB
  • srt~Get Your Files Here !/3. IoT Device - Cyber Security for Manufacturer/1. IoT Devices - CyberSecurity for Manufacturer-Pre-market Phase Part1.srt 15.1 kB
  • srt~Get Your Files Here !/3. IoT Device - Cyber Security for Manufacturer/3. IoT Devices - Cyber Security for Manufacturer - Post-market Phase.srt 12.5 kB
  • srt~Get Your Files Here !/3. IoT Device - Cyber Security for Manufacturer/2. IoT Devices - Cyber Security for Manufacturer - Pre-market Phase Part2.srt 11.5 kB
  • srt~Get Your Files Here !/2. IoT Device - Risk Mitigation/1. IoT - Risk Mitigation.srt 7.3 kB
  • srt~Get Your Files Here !/2. IoT Device - Risk Mitigation/3. IoT - Challenges with Risk Mitigation part2.srt 7.1 kB
  • srt~Get Your Files Here !/1. Introduction/1. Introduction to IoT Devices.srt 5.8 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 357 Bytes
  • urlGet Bonus Downloads Here.url 176 Bytes
【影视】 Udemy - Cloud Security & Container Security using AQUA Trivy & Snyk
收录时间:2025-02-11 文档个数:51 文档大小:1.0 GB 最近下载:2025-05-16 人气:732 磁力链接
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/36 - Hands On A07 Identification and Authentication Failures and its Controls.mp4 99.3 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/35 - Hands On A06 Vulnerable and Outdated Components Practical and its Controls.mp4 85.4 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/30 - Hands On A01 Broken Access Control Basics with Practical and its Controls.mp4 75.7 MB
  • mp45 - Hands On Additional Tools for Container Security/22 - HandsOn Using Snyk to perform Container Scan on Windows.mp4 68.7 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/39 - Hands On A10 ServerSide Request Forgery with Practical and its Controls.mp4 67.1 MB
  • mp45 - Hands On Additional Tools for Container Security/24 - Perform False Positive Analysis for Container Security Scans.mp4 60.8 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/34 - Hands On A05 Security Misconfiguration with Practical and its Controls.mp4 59.7 MB
  • mp45 - Hands On Additional Tools for Container Security/20 - HandsOn Using Trivy from AQUA to perform Container Scan on Windows.mp4 48.4 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/29 - Hands On Configure Burp Suite with Chrome Browser.mp4 46.0 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/31 - Hands On A02 Cryptographic Failures with Practical and its Controls.mp4 41.1 MB
  • mp42 - Basics of Containers and Container Security/7 - Create an Account on AQUA Now AQUA has removed trial account access.mp4 41.0 MB
  • mp45 - Hands On Additional Tools for Container Security/21 - HandsOn Using Docker scan to perform Container Scan on Windows.mp4 39.8 MB
  • mp43 - Implementation Scan Container images using AQUA/12 - Hands On Review Container scan results and reports in AQUA.mp4 38.8 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/38 - Hands On A09 Security Logging and Monitoring Failures and its Controls.mp4 35.6 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/33 - Hands On A04 Insecure Design with Practical and its Controls.mp4 27.6 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/32 - Hands On A03 Injection with Practical and its Controls.mp4 27.3 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/37 - Hands On A08 Software and Data Integrity Failures and its Controls.mp4 24.6 MB
  • mp44 - Cloud Security Posture Management CSPM/18 - Hands On Integrate AQUA with AWS.mp4 23.6 MB
  • mp43 - Implementation Scan Container images using AQUA/10 - Hands On Pull and push a vulnerable docker image to repo in Docker Hub.mp4 16.0 MB
  • mp46 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10/27 - Hands On Install OWASP Juice Shop on local System Part 2.mp4 14.6 MB
【影视】 Security.2017.1080p-dual-cast.mp4
收录时间:2017-09-21 文档个数:1 文档大小:1.6 GB 最近下载:2025-05-10 人气:731 磁力链接
  • mp4Security.2017.1080p-dual-cast.mp4 1.6 GB
【影视】 Pluralsight - AngularJS Security Fundamentals
收录时间:2017-02-11 文档个数:922 文档大小:435.6 MB 最近下载:2025-05-15 人气:728 磁力链接
  • mp401 Introduction/01 01 Overview.mp4 3.4 MB
  • mp401 Introduction/01 02 Why Angular Security.mp4 8.2 MB
  • mp401 Introduction/01 03 Who This Course Is For.mp4 7.1 MB
  • mp401 Introduction/01 04 About the Course.mp4 5.2 MB
  • mp401 Introduction/01 05 Introducing the Insecure AngularJS App.mp4 10.6 MB
  • mp401 Introduction/01 06 Summary.mp4 3.5 MB
  • mp402 Understanding Client Framework Security Boundaries/02 01 Overview.mp4 4.1 MB
  • mp402 Understanding Client Framework Security Boundaries/02 02 The Composition of AngularJS.mp4 20.1 MB
  • mp402 Understanding Client Framework Security Boundaries/02 03 Overview of the Web Stack.mp4 6.9 MB
  • mp402 Understanding Client Framework Security Boundaries/02 04 Typical Security Risks in the Stack.mp4 10.6 MB
  • mp402 Understanding Client Framework Security Boundaries/02 05 Defending the Stack.mp4 11.5 MB
  • mp402 Understanding Client Framework Security Boundaries/02 06 Always Assume the Client Is Compromised.mp4 6.4 MB
  • mp402 Understanding Client Framework Security Boundaries/02 07 Circumventing the Client.mp4 15.2 MB
  • mp402 Understanding Client Framework Security Boundaries/02 08 Summary.mp4 5.5 MB
  • mp403 Working with Security Controls on the Server/03 01 Overview.mp4 3.9 MB
  • mp403 Working with Security Controls on the Server/03 02 Understanding Page Lifecycles.mp4 11.9 MB
  • mp403 Working with Security Controls on the Server/03 03 Authentication and Identity Persistence.mp4 7.7 MB
  • mp403 Working with Security Controls on the Server/03 04 Cookies Versus Tokens.mp4 11.9 MB
  • mp403 Working with Security Controls on the Server/03 05 Sending the Bearer Token.mp4 12.4 MB
  • mp403 Working with Security Controls on the Server/03 06 Persisting the Bearer Token When the DOM Is Unloaded.mp4 18.4 MB
【影视】 AppDev.Developing Applications Using Visual Basic 2008 - Enterprise, Mobile, and Security
收录时间:2018-03-15 文档个数:103 文档大小:1.6 GB 最近下载:2025-05-08 人气:728 磁力链接
  • pdfCourse Book/Index.pdf 44.9 kB
  • pdfCourse Book/Intro.pdf 24.8 kB
  • pdfCourse Book/TOC.pdf 34.3 kB
  • exeLab Files/DevAppsVBLabs2008V3CD.exe 5.7 MB
  • wmvMedia/Module 01/01. Item Templates/01. Introduction.wmv 6.3 MB
  • wmvMedia/Module 01/01. Item Templates/02. Item Templates.wmv 47.5 MB
  • wmvMedia/Module 01/01. Item Templates/03. Summary.wmv 1.4 MB
  • wmvMedia/Module 01/02. Project Templates/01. Introduction.wmv 2.0 MB
  • wmvMedia/Module 01/02. Project Templates/02. Project Templates.wmv 53.2 MB
  • wmvMedia/Module 01/02. Project Templates/03. Summary.wmv 2.1 MB
  • wmvMedia/Module 01/03. Code Snippets/01. Introduction.wmv 2.3 MB
  • wmvMedia/Module 01/03. Code Snippets/02. Code Snippets.wmv 40.6 MB
  • wmvMedia/Module 01/03. Code Snippets/03. Summary.wmv 2.7 MB
  • wmvMedia/Module 02/04. Macros/01. Introduction.wmv 2.2 MB
  • wmvMedia/Module 02/04. Macros/02. Macros.wmv 38.0 MB
  • wmvMedia/Module 02/04. Macros/03. Summary.wmv 1.3 MB
  • wmvMedia/Module 02/05. Private Assemblies/01. Introduction.wmv 2.6 MB
  • wmvMedia/Module 02/05. Private Assemblies/02. Private Assemblies.wmv 44.7 MB
  • wmvMedia/Module 02/05. Private Assemblies/03. Summary.wmv 2.1 MB
  • wmvMedia/Module 02/06. Strong Naming/01. Introduction.wmv 2.0 MB
共178页 上一页 88 89 90 91 92 93 94 95 96 下一页