- 【影视】 Lynda - Securing SQL Server 2012
-
收录时间:2021-02-16
文档个数:21
文档大小:267.8 MB
最近下载:2025-01-22
人气:368
磁力链接
- 4. Creating and Assigning Logins and Roles/4.Assigning logins and roles for security.mp4 33.2 MB
- 4. Creating and Assigning Logins and Roles/3.Creating roles.mp4 21.5 MB
- 2. SQL Server Security Basics/4.Understanding and using roles.mp4 18.9 MB
- 4. Creating and Assigning Logins and Roles/2.Creating logins.mp4 17.6 MB
- 4. Creating and Assigning Logins and Roles/1.Understanding SQL Server authentication modes.mp4 17.1 MB
- 3. Understanding and Using SQL Server Permissions/3.Permissions applied to securables.mp4 16.9 MB
- 1. Security Best Practices for SQL Server/3.Network security considerations.mp4 16.1 MB
- 5. Securing SQL on the Network/3.Securing network protocols.mp4 14.8 MB
- 3. Understanding and Using SQL Server Permissions/2.Understanding how SQL Server checks permissions.mp4 13.5 MB
- 1. Security Best Practices for SQL Server/4.File system security.mp4 13.0 MB
- 2. SQL Server Security Basics/1.SQL Server securables.mp4 12.0 MB
- 2. SQL Server Security Basics/2.SQL Server principals.mp4 11.9 MB
- 2. SQL Server Security Basics/3.Manage logins and users.mp4 11.6 MB
- 1. Security Best Practices for SQL Server/2.SQL instance security.mp4 11.2 MB
- 0. Introduction/1.Welcome.mp4 9.4 MB
- 5. Securing SQL on the Network/1.Understanding network security risks.mp4 8.0 MB
- 5. Securing SQL on the Network/2.SQL Server Configuration Manager.mp4 6.6 MB
- 3. Understanding and Using SQL Server Permissions/1.SQL Server permissions.mp4 5.6 MB
- 1. Security Best Practices for SQL Server/1.Physical security.mp4 4.1 MB
- Conclusion/1.Next steps.mp4 3.8 MB
- 猜你喜欢:
Lynda
Server
2012
Securing
SQL
- 【影视】 DoctorAdventures: Kortney Kane & Madison Ivy (Securing the Will) XXX [264]
-
收录时间:2020-03-31
文档个数:3
文档大小:300.3 MB
最近下载:2024-12-26
人气:286
磁力链接
- da_kortney_madison_vl013114_480p_1000.mp4 299.7 MB
- Torrent Downloads piratepublic.com.rtf 549.9 kB
- Torrent Downloads piratepublic.com.txt 235 Bytes
- 猜你喜欢:
Madison
XXX
Securing
Kane
Will
264
DoctorAdventures
Ivy
Kortney
- 【影视】 WWE.Ruthless.Aggression.S02E05.Securing.the.Future.1080p.WEB.H264-DARKSPORT[rarbg]
-
收录时间:2022-04-15
文档个数:4
文档大小:1.9 GB
最近下载:2025-01-21
人气:286
磁力链接
- WWE.Ruthless.Aggression.S02E05.Securing.the.Future.1080p.WEB.H264-DARKSPORT.mkv 1.9 GB
- wwe.ruthless.aggression.s02e05.securing.the.future.1080p.web.h264-darksport.nfo 9.0 kB
- RARBG_DO_NOT_MIRROR.exe 99 Bytes
- RARBG.txt 30 Bytes
- 猜你喜欢:
WEB
Securing
Ruthless
S02E05
WWE
H264
Future
DARKSPORT
rarbg
1080p
- 【影视】 PentHouse - Missy Stone - Interoffice Intercourse 1: Securing The Position HD720P
-
收录时间:2020-04-17
文档个数:3
文档大小:423.9 MB
最近下载:2025-01-20
人气:265
磁力链接
- 15828_86249_1280x720_3000k.mp4 423.9 MB
- RARBG.COM.url 184 Bytes
- Torrent downloaded from rarbg.com.txt 33 Bytes
- 猜你喜欢:
PentHouse
Stone
Intercourse
Securing
Missy
Interoffice
Position
HD720P
- 【影视】 [DoctorAdventures] Kortney Kane, Madison Ivy (Securing the Will) [XXX]
-
收录时间:2020-03-06
文档个数:2
文档大小:299.7 MB
最近下载:2024-12-31
人气:250
磁力链接
- da_kortney_madison_480p.mp4 299.7 MB
- Torrent Downloads piratepublic.com.txt 226 Bytes
- 猜你喜欢:
Madison
XXX
Securing
Kane
Will
DoctorAdventures
Ivy
Kortney
- 【影视】 [FreeTutorials.us] hacking-securing-php
-
收录时间:2020-03-09
文档个数:69
文档大小:471.0 MB
最近下载:2024-09-05
人气:245
磁力链接
- 01 InjectionA1 - OWASP Top10/006 SQL Injection Union - Demo - Exploitation.mp4 30.2 MB
- 16 Cross-Site Request Forgery CSRF - A8 - OWASP Top10/055 Cross-Site Request Forgery CSRF - OWASP Top10 - A8 - Presentation.mp4 18.5 MB
- 01 InjectionA1 - OWASP Top10/009 SQL Injection - Demo - Defense.mp4 18.4 MB
- 05 InjectionA1 - PHP Object Injection/020 PHP Object Injection Demo 1.mp4 16.4 MB
- 01 InjectionA1 - OWASP Top10/003 SQLI.mp4 15.7 MB
- 01 InjectionA1 - OWASP Top10/002 Blind SQL Injection Presentation.mp4 14.8 MB
- 01 InjectionA1 - OWASP Top10/005 Union Exploitation Technique.mp4 14.8 MB
- 18 Unvalidated Redirects and Forwards - A10 - OWASPTop10/063 Unvalidated Redirects and Forwards - OWASP Top10 - A10 - Presentation.mp4 12.8 MB
- 12 Insecure Direct Object References - A4 - OWASP Top10/042 Insecure Direct Object Reference - OWASP Top10 - A4 - Presentation.mp4 11.5 MB
- 16 Cross-Site Request Forgery CSRF - A8 - OWASP Top10/060 CSRF - Demo - Post Defence.mp4 10.7 MB
- 10 Cross-Site Scripting XSS - A3 - OWASP Top10/036 Cross Site ScriptingXSS Stored - Presentation.mp4 10.6 MB
- 01 InjectionA1 - OWASP Top10/008 SQL Injection Login Bypass - Demo.mp4 10.3 MB
- 05 InjectionA1 - PHP Object Injection/021 PHP Object Injection Demo 2.mp4 10.3 MB
- 13 Security Misconfiguration - A5 - OWASP Top10/045 Security Misconfiguration - OWASP Top10 - A5 - Presentation.mp4 10.2 MB
- 16 Cross-Site Request Forgery CSRF - A8 - OWASP Top10/059 CSRF - Demo - Post Exploit.mp4 10.1 MB
- 16 Cross-Site Request Forgery CSRF - A8 - OWASP Top10/057 CSRF - Demo - Get Exploit.mp4 9.9 MB
- 03 InjectionA1 - XML XPath Injection/013 XML XPath Injection Presentation.mp4 9.1 MB
- 17 Using Components with Known Vulnerabilities - A9 - OWASP Top10/062 Using components with Known Vulnerabilities - A9 - Demo.mp4 9.1 MB
- 15 Missing Function Level Access Control - A7 - OWASP Top10/053 Missing Function Level Access Control - Demo - Exploitation2.mp4 9.0 MB
- 09 Broken Authentication and Session ManagementA2 - OWASP Top10/029 Broken Authentication and Session Management - OWASP Top10A2 - Presentation.mp4 8.8 MB
- 猜你喜欢:
hacking
securing
php
us
FreeTutorials
- 【影视】 [ CourseWikia.com ] Linkedin - Securing the Use of Generative AI in Your Organization
-
收录时间:2024-03-07
文档个数:40
文档大小:205.2 MB
最近下载:2024-11-29
人气:238
磁力链接
- ~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/02 - Public AI Risk Mitigation.mp4 31.4 MB
- ~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/05 - Hallucinations.mp4 23.8 MB
- ~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/02 - Governance of Generative AI.mp4 17.9 MB
- ~Get Your Files Here !/01 - Introduction/02 - Security Challenges in Generative AI.mp4 16.9 MB
- ~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/01 - NIST AI Risk management Framework.mp4 14.5 MB
- ~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/03 - Writing your Generative AI Policy.mp4 13.6 MB
- ~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/03 - Introducing the MITIGATE AI Cyber framework.mp4 12.1 MB
- ~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/01 - Top threats presented by Public AI.mp4 10.0 MB
- ~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/01 - Data Poisoning and Prompt Injection Attacks.mp4 9.5 MB
- ~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/03 - Model poisoning and manipulation.mp4 8.7 MB
- ~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/06 - Inadequate sandboxing and malcious code execution.mp4 8.3 MB
- ~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/02 - AI browser plugin risk management.mp4 7.7 MB
- ~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/02 - Model Inversion and Data Leakage.mp4 7.4 MB
- ~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/01 - Ethical and Bias Considerations in Generative AI.mp4 6.6 MB
- ~Get Your Files Here !/06 - Conclusion/01 - Gen AI Fortified Your roadmap ahead.mp4 6.0 MB
- ~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/04 - Model and Stealing.mp4 6.0 MB
- ~Get Your Files Here !/01 - Introduction/01 - Introduction to Generative AI.mp4 4.8 MB
- ~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Apply the TRUSTED Framework.pdf 40.1 kB
- ~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Write your Gen AI policy.pdf 37.8 kB
- ~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/AI Browser Plugin and Extension Strategy and Plan.pdf 33.3 kB
- 猜你喜欢:
Use
Securing
AI
CourseWikia
Linkedin
Generative
Organization
com
Your
- 【影视】 Lynda – Securing Microsoft Office Files
-
收录时间:2021-04-19
文档个数:49
文档大小:149.6 MB
最近下载:2025-01-08
人气:180
磁力链接
- 01_03-parts.mp4 8.7 MB
- 02_03-activex.mp4 8.5 MB
- 01_07-ranges.mp4 8.5 MB
- 02_04-external.mp4 8.0 MB
- 04_01-process.mp4 7.7 MB
- 02_06-locations.mp4 7.0 MB
- 02_05-privacy.mp4 6.5 MB
- 00_01-intro.mp4 6.4 MB
- 02_02-levels.mp4 6.1 MB
- 04_03-selfcert.mp4 5.9 MB
- 03_03-accessibility.mp4 5.9 MB
- 01_05-sheet.mp4 5.6 MB
- 04_04-sign.mp4 5.6 MB
- 01_02-pass.mp4 5.5 MB
- 01_01-passwords.mp4 5.4 MB
- 01_04-structure.mp4 5.4 MB
- 03_04-compatibility.mp4 5.2 MB
- 02_01-types.mp4 5.2 MB
- 01_08-superhide.mp4 5.2 MB
- 01_06-lock.mp4 4.8 MB
- 猜你喜欢:
Files
Lynda
Microsoft
Securing
Office
- 【影视】 DoctorAdventures.Kortney.Kane.Madison.Ivy.Securing.the.Will
-
收录时间:2023-09-22
文档个数:4
文档大小:300.0 MB
最近下载:2025-01-19
人气:178
磁力链接
- da.kortney.madison.vl013114.480p.1000.mp4 299.7 MB
- screens.jpg 191.2 kB
- poster.jpg 46.6 kB
- RARBG.com.txt 33 Bytes
- 猜你喜欢:
Madison
Securing
Kane
Will
DoctorAdventures
Ivy
Kortney
- 【影视】 Securing Generative AI
-
收录时间:2024-10-29
文档个数:34
文档大小:886.8 MB
最近下载:2025-01-22
人气:149
磁力链接
- Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4 71.1 MB
- Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
- Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 62.2 MB
- Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
- Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.4 MB
- Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.1 MB
- Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.6 MB
- Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
- Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
- Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
- Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.6 MB
- Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.1 MB
- Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.5 MB
- Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
- Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.2 MB
- Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
- Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
- Introduction/001. Securing Generative AI Introduction.mp4 19.7 MB
- Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
- Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.0 MB
- 猜你喜欢:
Generative
AI
Securing
- 【影视】 Chapter 11 Securing TCP.IP
-
收录时间:2020-05-20
文档个数:8
文档大小:344.5 MB
最近下载:2025-01-02
人气:136
磁力链接
- C11L06KerberosEAP.mp4 71.6 MB
- C11L05AAA.mp4 52.1 MB
- C11L07CryptographicTunnelswithSSH.mp4 51.3 MB
- C11L04AccessControl.mp4 49.1 MB
- C11L01SymmetricEncryption.mp4 43.2 MB
- C11L03CryptographicHashes.mp4 35.2 MB
- C11L02AsymmetricEncryption.mp4 28.6 MB
- C11L08NetworkTimeProtocol.mp4 13.5 MB
- 猜你喜欢:
Chapter
11
TCP
Securing
IP
- 【影视】 DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_1000).mp4
-
收录时间:2020-05-16
文档个数:1
文档大小:299.7 MB
最近下载:2024-12-06
人气:132
磁力链接
- DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_1000).mp4 299.7 MB
- 猜你喜欢:
480p
Madison
Securing
Kane
Will
mp4
DoctorAdventures
1000
Ivy
Kortney
- 【影视】 05 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4
-
收录时间:2024-02-16
文档个数:1
文档大小:3.2 GB
最近下载:2024-08-05
人气:123
磁力链接
- 05 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4 3.2 GB
- 猜你喜欢:
Blue
Madison
Securing
05
Kane
Will
mp4
Mick
2014
Ivy
- 【影视】 Implementing and Securing an API with ASP.NET Core
-
收录时间:2021-04-18
文档个数:78
文档大小:1.6 GB
最近下载:2024-12-20
人气:103
磁力链接
- 7. Adding Navigation/4. Demo - Adding Navigation and Routes.avi 83.2 MB
- 6. Designing More Pages/5. Demo - Creating the Shopping Cart.avi 67.5 MB
- 6. Designing More Pages/7. Demo - Creating View Components.avi 60.5 MB
- 5. Adding Data with EF Core/4. Demo - Adding EF Core to Our Application.avi 60.4 MB
- 4. Creating the Overview Page/4. Demo - Adding Models, the Repository, and the First Controller.avi 58.1 MB
- 11. Deployment the Site to Azure/6. Demo - Deploying the Site to Azure.avi 55.3 MB
- 9. Adding Client-Side Functionality/5. Creating the Load More Functionality Using Script and the API Controller.avi 53.7 MB
- 10. Adding Security Using ASP.NET Identity/6. Demo - Adding the Account Controller and the Login View.avi 49.4 MB
- 7. Adding Navigation/2. Routing Fundamentals.avi 48.8 MB
- 4. Creating the Overview Page/3. The MVC Pattern.avi 46.2 MB
- 8. Ordering with the Form/5. Demo - Validating the Form.avi 42.5 MB
- 5. Adding Data with EF Core/6. Demo - Database Initialization and Migrations.avi 42.4 MB
- 8. Ordering with the Form/3. Demo - Creating the Order Form.avi 41.5 MB
- 5. Adding Data with EF Core/3. Adding EF Core to Our Application.avi 39.5 MB
- aspdotnetcore-web-application-building.zip 39.1 MB
- 4. Creating the Overview Page/6. DemoL Creating Our First View.avi 38.7 MB
- 4. Creating the Overview Page/5. Creating the View.avi 31.6 MB
- 4. Creating the Overview Page/10. Demo - Adding Styles.avi 31.1 MB
- 8. Ordering with the Form/4. Adding Validation.avi 30.8 MB
- 6. Designing More Pages/9. Demo - Creating a Custom Tag Helper for the Contact Page.avi 28.2 MB
- 猜你喜欢:
Core
ASP
Securing
Implementing
API
NET
- 【影视】 DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_2000).mp4
-
收录时间:2021-10-04
文档个数:1
文档大小:561.6 MB
最近下载:2024-10-27
人气:88
磁力链接
- DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_2000).mp4 561.6 MB
- 猜你喜欢:
480p
Madison
Securing
Kane
mp4
Will
2000
DoctorAdventures
Ivy
Kortney
- 【影视】 DoctorAdventures: Kortney Kane & Madison Ivy (Securing the Will) XXX [264]
-
收录时间:2021-02-08
文档个数:3
文档大小:299.7 MB
最近下载:2024-08-30
人气:60
磁力链接
- da_kortney_madison_vl013114_480p_1000.mp4 299.7 MB
- Torrent Downloads piratepublic.com.txt 226 Bytes
- Torrent Downloads piratepublic.com.rtf 0 Bytes
- 猜你喜欢:
Madison
XXX
Securing
Kane
Will
264
DoctorAdventures
Ivy
Kortney
- 【影视】 Ellie Idol - Securing My Position.1920x1080.mp4
-
收录时间:2024-11-20
文档个数:1
文档大小:1.3 GB
最近下载:2024-12-22
人气:16
磁力链接
- Ellie Idol - Securing My Position.1920x1080.mp4 1.3 GB
- 猜你喜欢:
Securing
mp4
Ellie
1920x1080
Position
My
Idol