磁力狗

磁力狗
为您索检到68条磁力链接,耗时0毫秒。

最新地址

【影视】 [ DevCourseWeb.com ] Owasp Api Security Top 10 - With Nodejs Code Samples
收录时间:2023-12-21 文档个数:29 文档大小:1.3 GB 最近下载:2025-01-07 人气:1546 磁力链接
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/11 - Broken Object Property Level Authorization Identify Fix handson.mp4 202.1 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/9 - Broken Authentication Identify Fix handson.mp4 186.6 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/7 - Broken Object Level Authorization Identify Fix handson.mp4 181.4 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/21 - Security Misconfiguration Identify Fix hands on.mp4 130.3 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/5 - JSON Web Token Authentication Flow.mp4 129.8 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/17 - Unrestricted Access to Sensitive Business Flows Identify Fix handson.mp4 71.7 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/15 - Broken Function Level Authorization Identify Fix handson.mp4 56.7 MB
  • mp4~Get Your Files Here !/1 - Introduction/2 - About OWASP.mp4 49.8 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/25 - Unsafe Consumption of APIs Identify Fix hands on.mp4 43.6 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/19 - Server Side Request Forgery SSRF Identify Fix hands on.mp4 41.4 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 - Sample handson Application Overview.mp4 32.3 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/23 - Improper Inventory Managment Identify Fix hands on.mp4 31.9 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/18 - Server Side Request Forgery SSRF Intro.mp4 16.2 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/20 - Security Misconfiguration Intro.mp4 16.0 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/14 - Broken Function Level Authorization Intro.mp4 14.7 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/24 - Unsafe Consumption of APIs Intro.mp4 14.2 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/12 - Unrestricted Resource Consumption Intro.mp4 13.9 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/16 - Unrestricted Access to Sensitive Business Flows Intro.mp4 13.4 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Welcome.mp4 12.2 MB
  • mp4~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/8 - Broken Authentication.mp4 9.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - Demystifying OWASP Top 10 Large Language Models
收录时间:2024-01-10 文档个数:9 文档大小:142.2 MB 最近下载:2025-01-12 人气:482 磁力链接
  • mp4~Get Your Files Here !/3. Prompt Injection & Insecure Output Handling.mp4 30.5 MB
  • mp4~Get Your Files Here !/2. Miscellaneous Topics.mp4 29.6 MB
  • mp4~Get Your Files Here !/4. Training Data Poisoning & Model Denial Of Service.mp4 22.2 MB
  • mp4~Get Your Files Here !/5. Supply Chain Vulnerabilities & Sensitive Information Disclosure.mp4 19.0 MB
  • mp4~Get Your Files Here !/7. Over Reliance & Model Theft.mp4 18.1 MB
  • mp4~Get Your Files Here !/6. Insecure Plugin Design & Excessive Agency.mp4 17.3 MB
  • mp4~Get Your Files Here !/1. Introduction.mp4 5.6 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 OWASP Top 10 Web Application Security Exploit for beginners
收录时间:2024-02-10 文档个数:28 文档大小:1.3 GB 最近下载:2024-12-20 人气:314 磁力链接
  • mp401 - OWASP Top 10 Web Application Security Exploit/002 Components of Web Application.mp4 214.6 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/013 Advantages of WAF (Web Application Firewall).mp4 156.0 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/010 Broken Authentication Attack.mp4 125.7 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/009 Security Misconfiguration Attack.mp4 118.3 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/005 Cross Site Scripting Attack.mp4 118.2 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/001 SQL Injection Attack.mp4 109.5 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/007 Hidden Field Manipulation Attack.mp4 88.4 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/003 Parameter Tampering Attack.mp4 74.9 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/004 Sensitive Data Exposure Attack.mp4 66.0 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/012 Insufficient Logging & Monitoring Vulnerability.mp4 59.1 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/011 Buffer Overflow Attack.mp4 55.1 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/008 Cookie Poisoning Hijacking Attack.mp4 52.1 MB
  • mp401 - OWASP Top 10 Web Application Security Exploit/006 Forceful Browsing Attack.mp4 39.9 MB
  • srt01 - OWASP Top 10 Web Application Security Exploit/002 Components of Web Application_en.srt 34.9 kB
  • srt01 - OWASP Top 10 Web Application Security Exploit/013 Advantages of WAF (Web Application Firewall)_en.srt 28.6 kB
  • srt01 - OWASP Top 10 Web Application Security Exploit/010 Broken Authentication Attack_en.srt 21.9 kB
  • srt01 - OWASP Top 10 Web Application Security Exploit/005 Cross Site Scripting Attack_en.srt 18.5 kB
  • srt01 - OWASP Top 10 Web Application Security Exploit/009 Security Misconfiguration Attack_en.srt 17.8 kB
  • srt01 - OWASP Top 10 Web Application Security Exploit/001 SQL Injection Attack_en.srt 16.4 kB
  • srt01 - OWASP Top 10 Web Application Security Exploit/007 Hidden Field Manipulation Attack_en.srt 14.1 kB
【影视】 [ FreeCourseWeb.com ] PluralSight - API Security with the OWASP API Security Top 10
收录时间:2024-03-10 文档个数:73 文档大小:229.1 MB 最近下载:2025-01-10 人气:1436 磁力链接
  • mp4~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.mp4 11.4 MB
  • mp4~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.mp4 11.2 MB
  • mp4~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.mp4 11.2 MB
  • mp4~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.mp4 11.0 MB
  • mp4~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.mp4 10.9 MB
  • mp4~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.mp4 10.2 MB
  • mp4~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.mp4 9.6 MB
  • mp4~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.mp4 9.0 MB
  • mp4~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.mp4 8.3 MB
  • mp4~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.mp4 7.8 MB
  • mp4~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.mp4 6.9 MB
  • mp4~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.mp4 6.8 MB
  • mp4~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.mp4 6.7 MB
  • mp4~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.mp4 6.7 MB
  • mp4~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.mp4 6.7 MB
  • mp4~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.mp4 6.4 MB
  • mp4~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.mp4 6.3 MB
  • mp4~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.mp4 6.1 MB
  • mp4~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.mp4 6.1 MB
  • mp4~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.mp4 5.8 MB
【压缩文件】 API Security with the OWASP API Security Top 10
收录时间:2024-05-02 文档个数:71 文档大小:254.6 MB 最近下载:2025-01-07 人气:1222 磁力链接
  • zipowasp-api-security-top-10.zip 25.5 MB
  • mp407. Broken Function Level Authorization/02. Demo- Exploiting Broken Function Level Authorization.mp4 11.4 MB
  • mp404. Broken Authentication/04. Demo- Common JWT Attacks.mp4 11.2 MB
  • mp410. Security Misconfiguration/04. Misconfiguration in the API and Response Chain.mp4 11.2 MB
  • mp403. Broken Object Level Authorization/03. Demo- Broken Object Level Attacks.mp4 11.0 MB
  • mp402. Understanding the OWASP API Security Top 10/01. Using the OWASP API Security Top 10.mp4 10.9 MB
  • mp404. Broken Authentication/02. Password Based Attacks and Defenses.mp4 10.2 MB
  • mp411. Improper Inventory Management/03. Attacks and Defenses.mp4 9.6 MB
  • mp412. Unsafe Consumption of APIs/03. API Consumption Defenses.mp4 9.0 MB
  • mp404. Broken Authentication/03. Other Attacks and Defenses.mp4 8.3 MB
  • mp402. Understanding the OWASP API Security Top 10/02. Metrics behind the Top 10 Risks.mp4 7.8 MB
  • mp408. Unrestricted Access to Sensitive Business Flows/01. Sensitive Business Flows and Potential Attacks.mp4 6.9 MB
  • mp410. Security Misconfiguration/03. Server Environment Misconfigurations.mp4 6.8 MB
  • mp405. Broken Object Property Level Authorization/03. Demo- Exploiting Object Properties.mp4 6.7 MB
  • mp409. Server-side Request Forgery/01. Understanding Server-side Request Forgery.mp4 6.7 MB
  • mp406. Unrestricted Resource Consumption/01. Unrestricted Resource Consumption Attacks.mp4 6.7 MB
  • mp408. Unrestricted Access to Sensitive Business Flows/03. Business Flow Defenses.mp4 6.4 MB
  • mp411. Improper Inventory Management/01. Understanding Improper Inventory Management.mp4 6.3 MB
  • mp407. Broken Function Level Authorization/03. Defenses.mp4 6.1 MB
  • mp408. Unrestricted Access to Sensitive Business Flows/02. Demo- Attacking an Unrestricted Business Flow.mp4 6.1 MB
【影视】 OWASP
收录时间:2024-05-25 文档个数:1 文档大小:66.3 GB 最近下载:2025-01-13 人气:1253 磁力链接
  • OWASPOWASP 66.3 GB
【影视】 [ FreeCourseWeb.com ] OWASP Top 10 API Security Risks - 2023
收录时间:2024-10-25 文档个数:46 文档大小:2.3 GB 最近下载:2025-01-03 人气:1156 磁力链接
  • mp4~Get Your Files Here !/2 - Fundamental Principles of Application Security/2 -RBAC and ABAC.mp4 165.9 MB
  • mp4~Get Your Files Here !/15 - Summary and Best Practices/1 -API Security Best Practices.mp4 143.7 MB
  • mp4~Get Your Files Here !/13 - API92023/1 -API92023 - Improper Inventory Management.mp4 92.0 MB
  • mp4~Get Your Files Here !/14 - API102023/1 -API102023 - Unsafe Consumption of APIs.mp4 87.1 MB
  • mp4~Get Your Files Here !/14 - API102023/2 -Real-World Impact.mp4 76.9 MB
  • mp4~Get Your Files Here !/5 - API12023 - Broken Object Level Authorization/1 -API12023 - Broken Object Level Authorization.mp4 74.4 MB
  • mp4~Get Your Files Here !/8 - API42023/1 -API42023 - Unrestricted Resource Consumption.mp4 72.8 MB
  • mp4~Get Your Files Here !/3 - OWASP/1 -Introduction to OWASP.mp4 71.9 MB
  • mp4~Get Your Files Here !/12 - API82023/1 -API82023 - Security Misconfiguration.mp4 70.6 MB
  • mp4~Get Your Files Here !/2 - Fundamental Principles of Application Security/1 -CIA, AA.mp4 69.8 MB
  • mp4~Get Your Files Here !/10 - API62023/2 -Real-World Impact.mp4 64.2 MB
  • mp4~Get Your Files Here !/6 - API22023/1 -API22023 - Broken Authentication.mp4 64.2 MB
  • mp4~Get Your Files Here !/12 - API82023/3 -Mitigation Strategies.mp4 64.0 MB
  • mp4~Get Your Files Here !/13 - API92023/2 -Real-World Impact.mp4 63.8 MB
  • mp4~Get Your Files Here !/14 - API102023/3 -Mitigation Strategies.mp4 63.5 MB
  • mp4~Get Your Files Here !/7 - API32023/1 -API32023 - Broken Object Property Level Authorization.mp4 63.0 MB
  • mp4~Get Your Files Here !/11 - API72023/2 -Real-World Impact.mp4 59.4 MB
  • mp4~Get Your Files Here !/10 - API62023/3 -Mitigation Strategies.mp4 59.3 MB
  • mp4~Get Your Files Here !/5 - API12023 - Broken Object Level Authorization/3 -Mitigation Strategies.mp4 53.9 MB
  • mp4~Get Your Files Here !/13 - API92023/3 -Mitigation Strategies.mp4 49.0 MB
【影视】 [ DevCourseWeb.com ] Udemy - Secure Coding Based On OWASP Top 10 with Practical Examples
收录时间:2024-10-28 文档个数:29 文档大小:941.1 MB 最近下载:2025-01-09 人气:347 磁力链接
  • mp4~Get Your Files Here !/4 - Secure Coding - A032021 Injections/1 -Injections Explained.mp4 102.5 MB
  • mp4~Get Your Files Here !/5 - Secure Coding - A042021 Insecure Design/1 -Insecure Design Explained (Design Principles, Frameworks, Key Practices).mp4 73.3 MB
  • mp4~Get Your Files Here !/3 - Secure Coding - A022021 Cryptographic Failures/5 -Cryptographic Failures Prevention Guide.mp4 61.8 MB
  • mp4~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/2 -Ident. and Auth. Failures Example 1 (Login Brute Force, Sensitive Data in GET ).mp4 54.2 MB
  • mp4~Get Your Files Here !/4 - Secure Coding - A032021 Injections/4 -Vulnerable Code vs Secure Code Example 3 (XML Injection, File Upload, LDAP Inj.).mp4 53.2 MB
  • mp4~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/4 -Identification and Authentication Failures Prevention Guide.mp4 49.4 MB
  • mp4~Get Your Files Here !/6 - Secure Coding - A052021 Security Misconfiguration/1 -Security Misconfigurations (Security Hardenings, Error Handlings, Secure Config).mp4 48.8 MB
  • mp4~Get Your Files Here !/4 - Secure Coding - A032021 Injections/3 -Vulnerable Code vs Secure Code Example 2 (Command Injection).mp4 46.4 MB
  • mp4~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/1 -Identification and Authentication Failures Explained.mp4 40.0 MB
  • mp4~Get Your Files Here !/4 - Secure Coding - A032021 Injections/2 -Vulnerable Code vs Secure Code Example 1 (SQL Injection).mp4 38.5 MB
  • mp4~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/2 -Broken Access Control - Practical Example on a Vulnerable Web Application.mp4 37.3 MB
  • mp4~Get Your Files Here !/10 - Secure Coding - A092021 Security Logging and Monitoring Failures/1 -Security Logging and Monitoring Failures Explained.mp4 36.4 MB
  • mp4~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/3 -Identification and Authentication Failures Example 2.mp4 34.7 MB
  • mp4~Get Your Files Here !/11 - Secure Coding - A102021 Server-Side Request Forgery/1 -Server-Side Request Forgery All in One.mp4 33.7 MB
  • mp4~Get Your Files Here !/9 - Secure Coding - A082021 Software and Data Integrity Failures/1 -Software and Data Integrity Failures.mp4 29.3 MB
  • mp4~Get Your Files Here !/4 - Secure Coding - A032021 Injections/5 -Injection Prevention Guide.mp4 27.7 MB
  • mp4~Get Your Files Here !/7 - Secure Coding - A062021 Vulnerable and Outdated Components/1 -Vulnerable and Outdated Components All In One.mp4 27.0 MB
  • mp4~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/6 -Broken Access Controls Prevention Guide.mp4 23.4 MB
  • mp4~Get Your Files Here !/3 - Secure Coding - A022021 Cryptographic Failures/1 -Cryptographic Failures Explained.mp4 21.9 MB
  • mp4~Get Your Files Here !/1 - Giriş/1 -Introduction.mp4 15.8 MB
共4页 上一页 1 2 3 4 下一页
>