本站已收录 番号和无损神作磁力链接/BT种子 

Lynda - Programming Foundations - Web Security [AhLaN]

种子简介

种子名称: Lynda - Programming Foundations - Web Security [AhLaN]
文件类型: 视频
文件数目: 36个文件
文件大小: 772.37 MB
收录时间: 2020-8-10 21:37
已经下载: 3
资源热度: 146
最近下载: 2024-5-28 15:32

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:7fd1a0812ac94ff8903a82f8417c67a70269dea9&dn=Lynda - Programming Foundations - Web Security [AhLaN] 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Lynda - Programming Foundations - Web Security [AhLaN].torrent
  • 4 - 3. Filter Input, Control Output/17 - Sanitize data.mp437.4MB
  • 1 - Introduction/01 - The importance of security.mp420.4MB
  • 2 - 1. Security Overview/02 - What is security.mp417.18MB
  • 2 - 1. Security Overview/03 - Why security matters.mp412.29MB
  • 2 - 1. Security Overview/04 - What is a hacker.mp418.48MB
  • 2 - 1. Security Overview/05 - Threat models.mp419.93MB
  • 2 - 1. Security Overview/06 - Total security is unachievable.mp416.8MB
  • 3 - 2. General Security Principles/07 - Least privilege.mp422.02MB
  • 3 - 2. General Security Principles/08 - Simple is more secure.mp417.32MB
  • 3 - 2. General Security Principles/09 - Never trust users.mp419.75MB
  • 3 - 2. General Security Principles/10 - Expect the unexpected.mp411.53MB
  • 3 - 2. General Security Principles/11 - Defense in depth.mp422.03MB
  • 3 - 2. General Security Principles/12 - Security through obscurity.mp423.32MB
  • 3 - 2. General Security Principles/13 - Deny lists and allow lists.mp420.38MB
  • 3 - 2. General Security Principles/14 - Map exposure points and data passageways.mp419.14MB
  • 4 - 3. Filter Input, Control Output/15 - Regulate requests.mp424.53MB
  • 4 - 3. Filter Input, Control Output/16 - Validate input.mp422.16MB
  • 4 - 3. Filter Input, Control Output/18 - Label variables.mp46.24MB
  • 4 - 3. Filter Input, Control Output/19 - Keep code private.mp414.74MB
  • 4 - 3. Filter Input, Control Output/20 - Keep credentials private.mp423.81MB
  • 4 - 3. Filter Input, Control Output/21 - Keep error messages vague.mp414.11MB
  • 4 - 3. Filter Input, Control Output/22 - Smart logging.mp418.2MB
  • 5 - 4. The Most Common Attacks/23 - Types of credential attacks.mp429.38MB
  • 5 - 4. The Most Common Attacks/24 - Strong passwords.mp428.09MB
  • 5 - 4. The Most Common Attacks/25 - URL manipulation and insecure direct object reference (IDOR).mp426.29MB
  • 5 - 4. The Most Common Attacks/26 - SQL injection.mp433.19MB
  • 5 - 4. The Most Common Attacks/27 - Cross-site scripting (XSS).mp434.34MB
  • 5 - 4. The Most Common Attacks/28 - Cross-site request forgery (CSRF).mp425.93MB
  • 5 - 4. The Most Common Attacks/29 - Cross-site request protections.mp422.75MB
  • 5 - 4. The Most Common Attacks/30 - Cookie visibility and theft.mp427.13MB
  • 5 - 4. The Most Common Attacks/31 - Session hijacking.mp433.96MB
  • 5 - 4. The Most Common Attacks/32 - Session fixation.mp417.88MB
  • 5 - 4. The Most Common Attacks/33 - Remote code execution.mp414.69MB
  • 5 - 4. The Most Common Attacks/34 - File upload abuse.mp413.7MB
  • 5 - 4. The Most Common Attacks/35 - Denial of service.mp429.32MB
  • 6 - Conclusion/36 - Next steps.mp413.96MB