磁力搜索 BT种子搜索利器 免费下载BT种子,超4000万条种子数据
为您找到约 52 个磁力链接/BT种子,耗时 0 毫秒。
排序: 相关程度 热度 文件大小 添加时间 最近访问

[ FreeCourseWeb.com ] PHP Application Security (2025)

  • ~Get Your Files Here !/03. Cross-site Scripting (XSS)/08. Content Security Policy (CSP).mp4 22.9 MB
  • ~Get Your Files Here !/04. Cross-site Request Forgery (CSRF) and State Management Attacks/10. HTTP Strict Transport Security (HSTS).mp4 17.3 MB
  • ~Get Your Files Here !/04. Cross-site Request Forgery (CSRF) and State Management Attacks/03. Preventing CSRF.mp4 15.5 MB
  • ~Get Your Files Here !/03. Cross-site Scripting (XSS)/09. Allowing Inline Code.mp4 14.7 MB
  • ~Get Your Files Here !/03. Cross-site Scripting (XSS)/06. Demo - Preventing XSS.mp4 14.7 MB
  • ~Get Your Files Here !/7. Error Handling and Configuration/6. Security HTTP Headers.mp4 14.6 MB
  • ~Get Your Files Here !/5. SQL Injection/6. Prepared Statements.mp4 14.5 MB
  • ~Get Your Files Here !/2. Input Validation/3. Validating Mandatory Input.mp4 12.7 MB
  • ~Get Your Files Here !/2. Input Validation/7. Demo - Fixing Globoticket.mp4 12.3 MB
  • ~Get Your Files Here !/6. Storing Secrets/2. Hashing Algorithms.mp4 12.0 MB
  • ~Get Your Files Here !/6. Storing Secrets/5. Demo - Fixing Globoticket.mp4 11.9 MB
  • ~Get Your Files Here !/03/oracle-database-processes-slides.pdf 10.4 MB
  • ~Get Your Files Here !/05/redo-logs-and-control-files-slides.pdf 10.4 MB
  • ~Get Your Files Here !/7. Error Handling and Configuration/3. Error Configuration Settings.mp4 10.2 MB
  • ~Get Your Files Here !/02/chatting-with-a-money-exchange-rate-bot-built-with-react-slides.pdf 10.1 MB
  • ~Get Your Files Here !/2. Input Validation/1. What Is Input.mp4 10.1 MB
  • ~Get Your Files Here !/04. Cross-site Request Forgery (CSRF) and State Management Attacks/05. Demo - Clickjacking.mp4 9.3 MB
  • ~Get Your Files Here !/1. On PHP Web Application Security/2. Is PHP Insecure.mp4 9.2 MB
  • ~Get Your Files Here !/02/memory-structures-in-oracle-database-slides.pdf 9.2 MB
  • ~Get Your Files Here !/04/logical-storage-structures-slides.pdf 9.2 MB
[磁力链接] 添加时间:2025-05-07 大小:536.4 MB 最近下载:2025-09-17 热度:539

Application Security Weekly (Audio)

  • Application Security Weekly - 20.opus 15.5 MB
  • Application Security Weekly - 73.opus 12.9 MB
  • Application Security Weekly - 56.opus 12.3 MB
  • Application Security Weekly - 33.opus 12.1 MB
  • Application Security Weekly - 31.opus 12.1 MB
  • Application Security Weekly - 79.opus 11.8 MB
  • Application Security Weekly - 115.opus 11.8 MB
  • Application Security Weekly - 69.opus 11.6 MB
  • Application Security Weekly - 71.opus 11.5 MB
  • Application Security Weekly - 99.opus 11.5 MB
  • Application Security Weekly - 96.opus 11.4 MB
  • Application Security Weekly - 75.opus 11.3 MB
  • Application Security Weekly - 41.opus 11.3 MB
  • Application Security Weekly - 76.opus 11.3 MB
  • Application Security Weekly - 103.opus 11.2 MB
  • Application Security Weekly - 89.opus 11.2 MB
  • Application Security Weekly - 100.opus 11.2 MB
  • Application Security Weekly - 25.opus 11.2 MB
  • Application Security Weekly - 101.opus 11.2 MB
  • Application Security Weekly - 106.opus 11.2 MB
[磁力链接] 添加时间:2025-05-23 大小:1.2 GB 最近下载:2025-09-16 热度:752

CompTIA Security+ Exam Prep (SY0-401) Application, Data, and Host Security

  • CompTIA Security+ Exam Prep (SY0-401).tgz 334.8 MB
  • Torrent downloaded from demonoid.pw.txt 46 Bytes
  • Torrent Downloaded From ExtraTorrent.cc.txt 352 Bytes
[磁力链接] 添加时间:2017-02-10 大小:334.8 MB 最近下载:2025-05-20 热度:1169

Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security

  • 01 Application Security Controls and Techniques/01 01 Fuzzing.mp4 12.5 MB
  • 01 Application Security Controls and Techniques/01 02 Kali Linux and Pen Testing Tools.mp4 7.1 MB
  • 01 Application Security Controls and Techniques/01 03 Secure Coding Concepts.mp4 15.3 MB
  • 01 Application Security Controls and Techniques/01 04 Cross Site Scripting (XSS) and Cross Site Request Forgery (XSRF).mp4 17.7 MB
  • 01 Application Security Controls and Techniques/01 05 Application Baseline Configuration and Application Hardening.mp4 10.1 MB
  • 01 Application Security Controls and Techniques/01 06 Multi-tiered Approach and Application Patching.mp4 8.2 MB
  • 01 Application Security Controls and Techniques/01 07 SQL vs. NoSQL Databases.mp4 13.0 MB
  • 01 Application Security Controls and Techniques/01 08 Server-side vs. Client-side Validation.mp4 4.3 MB
  • 02 Mobile Security Concepts and Technologies/02 01 Device Security.mp4 25.2 MB
  • 02 Mobile Security Concepts and Technologies/02 02 Key Credential Management and Authentication.mp4 9.6 MB
  • 02 Mobile Security Concepts and Technologies/02 03 Geo-tagging.mp4 4.2 MB
  • 02 Mobile Security Concepts and Technologies/02 04 Transitive Trusts.mp4 5.6 MB
  • 02 Mobile Security Concepts and Technologies/02 05 BYOD Concerns.mp4 15.9 MB
  • 03 Establishing Host Security/03 01 Module Overview.mp4 6.0 MB
  • 03 Establishing Host Security/03 02 Operating System Security and Settings.mp4 6.5 MB
  • 03 Establishing Host Security/03 03 OS Hardening.mp4 3.0 MB
  • 03 Establishing Host Security/03 04 Patch Management.mp4 3.3 MB
  • 03 Establishing Host Security/03 05 White Listing and Black Listing Applications.mp4 3.3 MB
  • 03 Establishing Host Security/03 06 Trusted OS.mp4 9.7 MB
  • 03 Establishing Host Security/03 07 Host Based Firewalls.mp4 6.6 MB
[磁力链接] 添加时间:2017-02-27 大小:383.0 MB 最近下载:2025-09-03 热度:1137

[pluralsight-training.net] Enterprise Library Security and Cryptography Application Blocks

  • 1. Security Block Overview and Configuration/1. Introduction.wmv 1.6 MB
  • 1. Security Block Overview and Configuration/2. What The Security Block Does.wmv 5.4 MB
  • 1. Security Block Overview and Configuration/3. Why Use It.wmv 2.6 MB
  • 1. Security Block Overview and Configuration/4. AzMan.wmv 7.8 MB
  • 1. Security Block Overview and Configuration/5. Configuring.wmv 12.3 MB
  • 1. Security Block Overview and Configuration/6. Summary.wmv 2.0 MB
  • 2. Using the Security Block/1. Introduction.wmv 1.6 MB
  • 2. Using the Security Block/2. Caching an Identity.wmv 10.5 MB
  • 2. Using the Security Block/3. Using a Cached Credential.wmv 3.2 MB
  • 2. Using the Security Block/4. Caching Principals.wmv 5.1 MB
  • 2. Using the Security Block/5. Expiring Credentials.wmv 6.1 MB
  • 2. Using the Security Block/6. Configuring the Default Authorization Provider.wmv 14.2 MB
  • 2. Using the Security Block/7. Using AzMan.wmv 15.2 MB
  • 2. Using the Security Block/8. Summary.wmv 1.9 MB
  • 3. The Cryptography Block/1. Introduction.wmv 1.4 MB
  • 3. The Cryptography Block/2. What Is In The Block.wmv 1.8 MB
  • 3. The Cryptography Block/3. Why You Should Use It.wmv 2.8 MB
  • 3. The Cryptography Block/4. Understanding Encryption.wmv 1.9 MB
  • 3. The Cryptography Block/5. Configuration.wmv 17.9 MB
  • 3. The Cryptography Block/6. Basic Encryption.wmv 8.6 MB
[磁力链接] 添加时间:2017-04-12 大小:145.7 MB 最近下载:2025-08-28 热度:657

[ FreeCourseWeb.com ] Udemy - Mastering Nessus for Web Application and Network Security.zip

  • [ FreeCourseWeb.com ] Udemy - Mastering Nessus for Web Application and Network Security.zip 907.2 MB
[磁力链接] 添加时间:2021-05-04 大小:907.2 MB 最近下载:2025-09-13 热度:1304

[ DevCourseWeb.com ] Linkedin - Cisco DevNet Associate Exam Preparation 4 - Application Deployment and Security.zip

  • [ DevCourseWeb.com ] Linkedin - Cisco DevNet Associate Exam Preparation 4 - Application Deployment and Security.zip 269.6 MB
[磁力链接] 添加时间:2021-06-06 大小:269.6 MB 最近下载:2025-09-17 热度:1760

[ FreeCourseWeb.com ] Udemy - Web application Penetration testing & Security -Bug Hunting!.zip

  • [ FreeCourseWeb.com ] Udemy - Web application Penetration testing & Security -Bug Hunting!.zip 1.1 GB
[磁力链接] 添加时间:2022-01-10 大小:1.1 GB 最近下载:2025-09-08 热度:1492

EC-Council - Web Application Hacking and Security 2021

  • 5. Expert/4. Expert Security Misconfiguration.mp4 225.3 MB
  • 4. Proficient/1. Proficient Broken Access Control 1.mp4 164.5 MB
  • 5. Expert/2. Expert Server Level Access 2.mp4 163.4 MB
  • 5. Expert/1. Expert Server Level Access 1.mp4 162.3 MB
  • 4. Proficient/2. Proficient Broken Access Control 2.mp4 156.6 MB
  • 4. Proficient/7. Proficient Server Level Access 4.mp4 152.5 MB
  • 5. Expert/3. Expert Server Level Access 3.mp4 152.2 MB
  • 3. Intermediate/1. Intermediate SQL Injection 1.mp4 129.2 MB
  • 4. Proficient/5. Proficient Server Level Access 2.mp4 122.1 MB
  • 1. Introduction/1. Introduction.mp4 121.5 MB
  • 4. Proficient/8. Proficient Server Level Access 5.mp4 94.5 MB
  • 4. Proficient/4. Proficient Server Level Access 1.mp4 83.0 MB
  • 4. Proficient/3. Proficient Security Misconfiguration.mp4 82.2 MB
  • 4. Proficient/6. Proficient Server Level Access 3.mp4 78.7 MB
  • 3. Intermediate/6. Intermediate Broken Access Control 3.mp4 78.3 MB
  • 3. Intermediate/3. Intermediate Security Misconfiguration.mp4 58.7 MB
  • 3. Intermediate/4. Intermediate Broken Access Control 1.mp4 49.4 MB
  • 3. Intermediate/2. Intermediate SQL Injection 2.mp4 49.2 MB
  • 2. Beginner/2. Beginner Security Misconfiguration.mp4 46.5 MB
  • 2. Beginner/1. Beginner SQL Injection.mp4 44.9 MB
[磁力链接] 添加时间:2022-02-26 大小:2.4 GB 最近下载:2025-09-18 热度:3183

[Tutorialsplanet.NET] Udemy - OAuth 2 Web Security & Application Authentication

  • 1. Introduction to OAuth/1. What Will You Learn in This Course.mp4 216.3 MB
  • 1. Introduction to OAuth/2. What Problem Does OAuth Solve.mp4 207.1 MB
  • 3. After the Theory/1. Practical OAuth Part 1.mp4 206.8 MB
  • 3. After the Theory/2. Practical OAuth Part 2.mp4 204.4 MB
  • 2. OAuth Flows/3. OAuth Authorization Flow Example.mp4 152.7 MB
  • 2. OAuth Flows/4. OAuth Implicit Flow Example.mp4 147.4 MB
  • 2. OAuth Flows/1. OAuth API & Standard Flow.mp4 147.1 MB
  • 3. After the Theory/3. Final Thoughts What Are The Next Steps.mp4 106.0 MB
  • 2. OAuth Flows/5. Granting Client Credential Flow Example.mp4 53.9 MB
  • 2. OAuth Flows/6. Granting Resource Owner Password Credential Flow Example.mp4 51.0 MB
  • 2. OAuth Flows/2. Examples of Flows in OAuth.mp4 31.4 MB
  • 3. After the Theory/2. Practical OAuth Part 2.vtt 18.3 kB
  • 3. After the Theory/1. Practical OAuth Part 1.vtt 15.5 kB
  • 1. Introduction to OAuth/1. What Will You Learn in This Course.vtt 13.9 kB
  • 1. Introduction to OAuth/2. What Problem Does OAuth Solve.vtt 13.4 kB
  • 2. OAuth Flows/3. OAuth Authorization Flow Example.vtt 12.7 kB
  • 2. OAuth Flows/4. OAuth Implicit Flow Example.vtt 12.0 kB
  • 2. OAuth Flows/1. OAuth API & Standard Flow.vtt 9.7 kB
  • 3. After the Theory/3. Final Thoughts What Are The Next Steps.vtt 6.9 kB
  • 2. OAuth Flows/5. Granting Client Credential Flow Example.vtt 4.0 kB
[磁力链接] 添加时间:2023-12-24 大小:1.5 GB 最近下载:2025-09-17 热度:1078

[ DevCourseWeb.com ] PluralSight - Implementing Service Provider Security and Application Control

  • ~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/3. Demo - Implementing the Short Pipe QoS Model.mp4 27.1 MB
  • ~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/5. Demo - Implementing the Uniform QoS Model.mp4 23.2 MB
  • ~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/4. Demo - Implementing the Long Pipe QoS Model.mp4 22.5 MB
  • ~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/2. Demo - Configuring IPv6 Multi-topology IS-IS.mp4 19.6 MB
  • ~Get Your Files Here !/4. Applying Service Provider Security Techniques/2. Demo - Configuring Infrastructure ACLs (IACL).mp4 16.4 MB
  • ~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/3. Demo - Configuring Dual-stack OSPFv3.mp4 15.9 MB
  • ~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/3. Demo - Protecting Devices with CPP and LPTS.mp4 14.2 MB
  • ~Get Your Files Here !/4. Applying Service Provider Security Techniques/4. Demo - Securing OSPF and BGP Sessions with TTL-security.mp4 13.3 MB
  • ~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/5. Demo - Configuring IGP Synchronization.mp4 12.8 MB
  • ~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/2. Comparing the Three MPLS QoS Models.mp4 12.0 MB
  • ~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/1. QoS Techniques - Classifying, Marking, Queuing, and Traffic C.mp4 11.3 MB
  • ~Get Your Files Here !/4. Applying Service Provider Security Techniques/3. Demo - Configuring Unicast Reverse Path Forwarding (URPF).mp4 11.0 MB
  • ~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/4. Demo - Configuring LDP Session Protection.mp4 10.1 MB
  • ~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/2. Demo - Reviewing the OSPFv2 and LDP Core.mp4 9.2 MB
  • ~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/1. Course Introduction, Expectations, and Topology Review.mp4 9.2 MB
  • ~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/3. Understanding LDP Session Protection and IGP Synchronization.mp4 7.9 MB
  • ~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/1. Securing Device Access with AAA - RADIUS and TACACS.mp4 7.4 MB
  • ~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/4. Validating BGP Advertisements with BGPsec.mp4 7.3 MB
  • ~Get Your Files Here !/4. Applying Service Provider Security Techniques/1. Common Service Provider Security Techniques.mp4 5.8 MB
  • ~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/6. Demo - Filtering LDP Label Advertisements.mp4 5.7 MB
[磁力链接] 添加时间:2023-12-29 大小:281.9 MB 最近下载:2025-08-30 热度:1415

[ DevCourseWeb.com ] PluralSight - Zero Trust Application and Data Security

  • ~Get Your Files Here !/1-Zero Trust Application Security Fundamentals/2 -Demo Secure Coding.mp4 25.2 MB
  • ~Get Your Files Here !/2-Data Protection Techniques in Zero Trust/4 -Data Protection Techniques in Zero Trust.mp4 20.1 MB
  • ~Get Your Files Here !/1-Zero Trust Application Security Fundamentals/1 -Zero Trust Application Security Fundamentals.mp4 11.8 MB
  • ~Get Your Files Here !/2-Data Protection Techniques in Zero Trust/5 -Demo Cyber Chef.mp4 11.0 MB
  • ~Get Your Files Here !/3-Best Practices and Implementation Challenges in Zero Trust/8 -Best Practices and Implementation Challenges in Zero Trust.mp4 11.0 MB
  • ~Get Your Files Here !/3-Best Practices and Implementation Challenges in Zero Trust/9 -Network Segmentation in Zero Trust.mp4 9.5 MB
  • ~Get Your Files Here !/1-Zero Trust Application Security Fundamentals/3 -Challenge Questions.mp4 6.6 MB
  • ~Get Your Files Here !/2-Data Protection Techniques in Zero Trust/6 -Case Studies.mp4 6.0 MB
  • ~Get Your Files Here !/3-Best Practices and Implementation Challenges in Zero Trust/10 -Challenge Questions.mp4 5.3 MB
  • ~Get Your Files Here !/2-Data Protection Techniques in Zero Trust/7 -Challenge Questions.mp4 4.8 MB
  • ~Get Your Files Here !/02/data-protection-techniques-in-zero-trust-slides.pdf 3.8 MB
  • ~Get Your Files Here !/01/zero-trust-application-security-fundamentals-slides.pdf 3.2 MB
  • ~Get Your Files Here !/03/best-practices-and-implementation-challenges-in-zero-trust-slides.pdf 2.0 MB
  • ~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • Get Bonus Downloads Here.url 182 Bytes
[磁力链接] 添加时间:2025-02-06 大小:120.1 MB 最近下载:2025-09-08 热度:447


共3页 上一页 1 2 3 下一页