磁力狗

磁力狗
为您索检到117条磁力链接,耗时0毫秒。

最新地址

【影视】 Lynda - Securing SQL Server 2012
收录时间:2021-02-16 文档个数:21 文档大小:267.8 MB 最近下载:2025-01-22 人气:368 磁力链接
  • mp44. Creating and Assigning Logins and Roles/4.Assigning logins and roles for security.mp4 33.2 MB
  • mp44. Creating and Assigning Logins and Roles/3.Creating roles.mp4 21.5 MB
  • mp42. SQL Server Security Basics/4.Understanding and using roles.mp4 18.9 MB
  • mp44. Creating and Assigning Logins and Roles/2.Creating logins.mp4 17.6 MB
  • mp44. Creating and Assigning Logins and Roles/1.Understanding SQL Server authentication modes.mp4 17.1 MB
  • mp43. Understanding and Using SQL Server Permissions/3.Permissions applied to securables.mp4 16.9 MB
  • mp41. Security Best Practices for SQL Server/3.Network security considerations.mp4 16.1 MB
  • mp45. Securing SQL on the Network/3.Securing network protocols.mp4 14.8 MB
  • mp43. Understanding and Using SQL Server Permissions/2.Understanding how SQL Server checks permissions.mp4 13.5 MB
  • mp41. Security Best Practices for SQL Server/4.File system security.mp4 13.0 MB
  • mp42. SQL Server Security Basics/1.SQL Server securables.mp4 12.0 MB
  • mp42. SQL Server Security Basics/2.SQL Server principals.mp4 11.9 MB
  • mp42. SQL Server Security Basics/3.Manage logins and users.mp4 11.6 MB
  • mp41. Security Best Practices for SQL Server/2.SQL instance security.mp4 11.2 MB
  • mp40. Introduction/1.Welcome.mp4 9.4 MB
  • mp45. Securing SQL on the Network/1.Understanding network security risks.mp4 8.0 MB
  • mp45. Securing SQL on the Network/2.SQL Server Configuration Manager.mp4 6.6 MB
  • mp43. Understanding and Using SQL Server Permissions/1.SQL Server permissions.mp4 5.6 MB
  • mp41. Security Best Practices for SQL Server/1.Physical security.mp4 4.1 MB
  • mp4Conclusion/1.Next steps.mp4 3.8 MB
【影视】 DoctorAdventures: Kortney Kane & Madison Ivy (Securing the Will) XXX [264]
收录时间:2020-03-31 文档个数:3 文档大小:300.3 MB 最近下载:2024-12-26 人气:286 磁力链接
  • mp4da_kortney_madison_vl013114_480p_1000.mp4 299.7 MB
  • rtfTorrent Downloads piratepublic.com.rtf 549.9 kB
  • txtTorrent Downloads piratepublic.com.txt 235 Bytes
【影视】 WWE.Ruthless.Aggression.S02E05.Securing.the.Future.1080p.WEB.H264-DARKSPORT[rarbg]
收录时间:2022-04-15 文档个数:4 文档大小:1.9 GB 最近下载:2025-01-21 人气:286 磁力链接
  • mkvWWE.Ruthless.Aggression.S02E05.Securing.the.Future.1080p.WEB.H264-DARKSPORT.mkv 1.9 GB
  • nfowwe.ruthless.aggression.s02e05.securing.the.future.1080p.web.h264-darksport.nfo 9.0 kB
  • exeRARBG_DO_NOT_MIRROR.exe 99 Bytes
  • txtRARBG.txt 30 Bytes
【影视】 PentHouse - Missy Stone - Interoffice Intercourse 1: Securing The Position HD720P
收录时间:2020-04-17 文档个数:3 文档大小:423.9 MB 最近下载:2025-01-20 人气:265 磁力链接
  • mp415828_86249_1280x720_3000k.mp4 423.9 MB
  • urlRARBG.COM.url 184 Bytes
  • txtTorrent downloaded from rarbg.com.txt 33 Bytes
【影视】 [DoctorAdventures] Kortney Kane, Madison Ivy (Securing the Will) [XXX]
收录时间:2020-03-06 文档个数:2 文档大小:299.7 MB 最近下载:2024-12-31 人气:250 磁力链接
  • mp4da_kortney_madison_480p.mp4 299.7 MB
  • txtTorrent Downloads piratepublic.com.txt 226 Bytes
【影视】 [FreeTutorials.us] hacking-securing-php
收录时间:2020-03-09 文档个数:69 文档大小:471.0 MB 最近下载:2024-09-05 人气:245 磁力链接
  • mp401 InjectionA1 - OWASP Top10/006 SQL Injection Union - Demo - Exploitation.mp4 30.2 MB
  • mp416 Cross-Site Request Forgery CSRF - A8 - OWASP Top10/055 Cross-Site Request Forgery CSRF - OWASP Top10 - A8 - Presentation.mp4 18.5 MB
  • mp401 InjectionA1 - OWASP Top10/009 SQL Injection - Demo - Defense.mp4 18.4 MB
  • mp405 InjectionA1 - PHP Object Injection/020 PHP Object Injection Demo 1.mp4 16.4 MB
  • mp401 InjectionA1 - OWASP Top10/003 SQLI.mp4 15.7 MB
  • mp401 InjectionA1 - OWASP Top10/002 Blind SQL Injection Presentation.mp4 14.8 MB
  • mp401 InjectionA1 - OWASP Top10/005 Union Exploitation Technique.mp4 14.8 MB
  • mp418 Unvalidated Redirects and Forwards - A10 - OWASPTop10/063 Unvalidated Redirects and Forwards - OWASP Top10 - A10 - Presentation.mp4 12.8 MB
  • mp412 Insecure Direct Object References - A4 - OWASP Top10/042 Insecure Direct Object Reference - OWASP Top10 - A4 - Presentation.mp4 11.5 MB
  • mp416 Cross-Site Request Forgery CSRF - A8 - OWASP Top10/060 CSRF - Demo - Post Defence.mp4 10.7 MB
  • mp410 Cross-Site Scripting XSS - A3 - OWASP Top10/036 Cross Site ScriptingXSS Stored - Presentation.mp4 10.6 MB
  • mp401 InjectionA1 - OWASP Top10/008 SQL Injection Login Bypass - Demo.mp4 10.3 MB
  • mp405 InjectionA1 - PHP Object Injection/021 PHP Object Injection Demo 2.mp4 10.3 MB
  • mp413 Security Misconfiguration - A5 - OWASP Top10/045 Security Misconfiguration - OWASP Top10 - A5 - Presentation.mp4 10.2 MB
  • mp416 Cross-Site Request Forgery CSRF - A8 - OWASP Top10/059 CSRF - Demo - Post Exploit.mp4 10.1 MB
  • mp416 Cross-Site Request Forgery CSRF - A8 - OWASP Top10/057 CSRF - Demo - Get Exploit.mp4 9.9 MB
  • mp403 InjectionA1 - XML XPath Injection/013 XML XPath Injection Presentation.mp4 9.1 MB
  • mp417 Using Components with Known Vulnerabilities - A9 - OWASP Top10/062 Using components with Known Vulnerabilities - A9 - Demo.mp4 9.1 MB
  • mp415 Missing Function Level Access Control - A7 - OWASP Top10/053 Missing Function Level Access Control - Demo - Exploitation2.mp4 9.0 MB
  • mp409 Broken Authentication and Session ManagementA2 - OWASP Top10/029 Broken Authentication and Session Management - OWASP Top10A2 - Presentation.mp4 8.8 MB
【影视】 [ CourseWikia.com ] Linkedin - Securing the Use of Generative AI in Your Organization
收录时间:2024-03-07 文档个数:40 文档大小:205.2 MB 最近下载:2024-11-29 人气:238 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/02 - Public AI Risk Mitigation.mp4 31.4 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/05 - Hallucinations.mp4 23.8 MB
  • mp4~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/02 - Governance of Generative AI.mp4 17.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - Security Challenges in Generative AI.mp4 16.9 MB
  • mp4~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/01 - NIST AI Risk management Framework.mp4 14.5 MB
  • mp4~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/03 - Writing your Generative AI Policy.mp4 13.6 MB
  • mp4~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/03 - Introducing the MITIGATE AI Cyber framework.mp4 12.1 MB
  • mp4~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/01 - Top threats presented by Public AI.mp4 10.0 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/01 - Data Poisoning and Prompt Injection Attacks.mp4 9.5 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/03 - Model poisoning and manipulation.mp4 8.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/06 - Inadequate sandboxing and malcious code execution.mp4 8.3 MB
  • mp4~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/02 - AI browser plugin risk management.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/02 - Model Inversion and Data Leakage.mp4 7.4 MB
  • mp4~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/01 - Ethical and Bias Considerations in Generative AI.mp4 6.6 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Gen AI Fortified Your roadmap ahead.mp4 6.0 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/04 - Model and Stealing.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Introduction to Generative AI.mp4 4.8 MB
  • pdf~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Apply the TRUSTED Framework.pdf 40.1 kB
  • pdf~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Write your Gen AI policy.pdf 37.8 kB
  • pdf~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/AI Browser Plugin and Extension Strategy and Plan.pdf 33.3 kB
【影视】 Lynda – Securing Microsoft Office Files
收录时间:2021-04-19 文档个数:49 文档大小:149.6 MB 最近下载:2025-01-08 人气:180 磁力链接
  • mp401_03-parts.mp4 8.7 MB
  • mp402_03-activex.mp4 8.5 MB
  • mp401_07-ranges.mp4 8.5 MB
  • mp402_04-external.mp4 8.0 MB
  • mp404_01-process.mp4 7.7 MB
  • mp402_06-locations.mp4 7.0 MB
  • mp402_05-privacy.mp4 6.5 MB
  • mp400_01-intro.mp4 6.4 MB
  • mp402_02-levels.mp4 6.1 MB
  • mp404_03-selfcert.mp4 5.9 MB
  • mp403_03-accessibility.mp4 5.9 MB
  • mp401_05-sheet.mp4 5.6 MB
  • mp404_04-sign.mp4 5.6 MB
  • mp401_02-pass.mp4 5.5 MB
  • mp401_01-passwords.mp4 5.4 MB
  • mp401_04-structure.mp4 5.4 MB
  • mp403_04-compatibility.mp4 5.2 MB
  • mp402_01-types.mp4 5.2 MB
  • mp401_08-superhide.mp4 5.2 MB
  • mp401_06-lock.mp4 4.8 MB
【影视】 DoctorAdventures.Kortney.Kane.Madison.Ivy.Securing.the.Will
收录时间:2023-09-22 文档个数:4 文档大小:300.0 MB 最近下载:2025-01-19 人气:178 磁力链接
  • mp4da.kortney.madison.vl013114.480p.1000.mp4 299.7 MB
  • jpgscreens.jpg 191.2 kB
  • jpgposter.jpg 46.6 kB
  • txtRARBG.com.txt 33 Bytes
【影视】 Securing Generative AI
收录时间:2024-10-29 文档个数:34 文档大小:886.8 MB 最近下载:2025-01-22 人气:149 磁力链接
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4 71.1 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 62.2 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.4 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.6 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.6 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.5 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.2 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
  • mp4Introduction/001. Securing Generative AI Introduction.mp4 19.7 MB
  • mp4Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.0 MB
【影视】 Chapter 11 Securing TCP.IP
收录时间:2020-05-20 文档个数:8 文档大小:344.5 MB 最近下载:2025-01-02 人气:136 磁力链接
  • mp4C11L06KerberosEAP.mp4 71.6 MB
  • mp4C11L05AAA.mp4 52.1 MB
  • mp4C11L07CryptographicTunnelswithSSH.mp4 51.3 MB
  • mp4C11L04AccessControl.mp4 49.1 MB
  • mp4C11L01SymmetricEncryption.mp4 43.2 MB
  • mp4C11L03CryptographicHashes.mp4 35.2 MB
  • mp4C11L02AsymmetricEncryption.mp4 28.6 MB
  • mp4C11L08NetworkTimeProtocol.mp4 13.5 MB
【影视】 DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_1000).mp4
收录时间:2020-05-16 文档个数:1 文档大小:299.7 MB 最近下载:2024-12-06 人气:132 磁力链接
  • mp4DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_1000).mp4 299.7 MB
【影视】 05 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4
收录时间:2024-02-16 文档个数:1 文档大小:3.2 GB 最近下载:2024-08-05 人气:123 磁力链接
  • mp405 - Securing the Will 2014 - Kortney Kane & Madison Ivy & Mick Blue.mp4 3.2 GB
【影视】 Implementing and Securing an API with ASP.NET Core
收录时间:2021-04-18 文档个数:78 文档大小:1.6 GB 最近下载:2024-12-20 人气:103 磁力链接
  • avi7. Adding Navigation/4. Demo - Adding Navigation and Routes.avi 83.2 MB
  • avi6. Designing More Pages/5. Demo - Creating the Shopping Cart.avi 67.5 MB
  • avi6. Designing More Pages/7. Demo - Creating View Components.avi 60.5 MB
  • avi5. Adding Data with EF Core/4. Demo - Adding EF Core to Our Application.avi 60.4 MB
  • avi4. Creating the Overview Page/4. Demo - Adding Models, the Repository, and the First Controller.avi 58.1 MB
  • avi11. Deployment the Site to Azure/6. Demo - Deploying the Site to Azure.avi 55.3 MB
  • avi9. Adding Client-Side Functionality/5. Creating the Load More Functionality Using Script and the API Controller.avi 53.7 MB
  • avi10. Adding Security Using ASP.NET Identity/6. Demo - Adding the Account Controller and the Login View.avi 49.4 MB
  • avi7. Adding Navigation/2. Routing Fundamentals.avi 48.8 MB
  • avi4. Creating the Overview Page/3. The MVC Pattern.avi 46.2 MB
  • avi8. Ordering with the Form/5. Demo - Validating the Form.avi 42.5 MB
  • avi5. Adding Data with EF Core/6. Demo - Database Initialization and Migrations.avi 42.4 MB
  • avi8. Ordering with the Form/3. Demo - Creating the Order Form.avi 41.5 MB
  • avi5. Adding Data with EF Core/3. Adding EF Core to Our Application.avi 39.5 MB
  • zipaspdotnetcore-web-application-building.zip 39.1 MB
  • avi4. Creating the Overview Page/6. DemoL Creating Our First View.avi 38.7 MB
  • avi4. Creating the Overview Page/5. Creating the View.avi 31.6 MB
  • avi4. Creating the Overview Page/10. Demo - Adding Styles.avi 31.1 MB
  • avi8. Ordering with the Form/4. Adding Validation.avi 30.8 MB
  • avi6. Designing More Pages/9. Demo - Creating a Custom Tag Helper for the Contact Page.avi 28.2 MB
【影视】 DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_2000).mp4
收录时间:2021-10-04 文档个数:1 文档大小:561.6 MB 最近下载:2024-10-27 人气:88 磁力链接
  • mp4DoctorAdventures - Kortney Kane, Madison Ivy - Securing The Will (480p_2000).mp4 561.6 MB
【影视】 DoctorAdventures: Kortney Kane & Madison Ivy (Securing the Will) XXX [264]
收录时间:2021-02-08 文档个数:3 文档大小:299.7 MB 最近下载:2024-08-30 人气:60 磁力链接
  • mp4da_kortney_madison_vl013114_480p_1000.mp4 299.7 MB
  • txtTorrent Downloads piratepublic.com.txt 226 Bytes
  • rtfTorrent Downloads piratepublic.com.rtf 0 Bytes
【影视】 Ellie Idol - Securing My Position.1920x1080.mp4
收录时间:2024-11-20 文档个数:1 文档大小:1.3 GB 最近下载:2024-12-22 人气:16 磁力链接
  • mp4Ellie Idol - Securing My Position.1920x1080.mp4 1.3 GB
共6页 上一页 2 3 4 5 6 下一页
>