种子简介
种子名称:
Lynda.com Foundations of Programming Web Security with Kevin Skoglund
文件类型:
视频
文件数目:
51个文件
文件大小:
299.07 MB
收录时间:
2019-6-2 10:02
已经下载:
3次
资源热度:
203
最近下载:
2024-10-30 17:18
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:b6b636d4c4a2f9ecce0455ff17e693c4357d32a1&dn=Lynda.com Foundations of Programming Web Security with Kevin Skoglund
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Lynda.com Foundations of Programming Web Security with Kevin Skoglund.torrent
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/04. Brute-force attacks.mp411.28MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/03. Sanitizing data.mp410.38MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/03. SQL injection.mp49.28MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/09. Multi-factor authentication.mp49.26MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/02. Validating input.mp49.25MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/02. Cross-site request forgery (CSRF).mp49.05MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/07. Session hijacking.mp48.56MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/08. Handling forgotten passwords.mp48.27MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/02. Salting passwords.mp48.13MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/05. Faked requests and forms.mp47.99MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/04. URL manipulation.mp47.83MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/06. Keeping credentials private.mp47.78MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/08. Smart logging.mp47.6MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/01. Credit card payments.mp47.57MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/11. Denial of service.mp47.54MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/05. Source code managers.mp47.35MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/03. What is a hacker.mp47.25MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/05. Using SSL for login.mp47.12MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/01. Cross-site scripting (XSS).mp47.08MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/02. Regular expression flaws.mp47.02MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/06. Database security.mp46.6MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/07. Regulating access privileges.mp46.12MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/01. Least privilege.mp46.07MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/07. Server security.mp45.92MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/01. Password encryption.mp45.76MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/02. Why security matters.mp45.72MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/05. Keeping code private.mp45.58MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/06. Cookie visibility and theft.mp45.25MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/0. Introduction/01. Introduction.mp44.82MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/05. Get in the security mind-set.mp44.76MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/09. Remote system execution.mp44.72MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/04. Total security is unachievable.mp44.71MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/06. Write a security policy.mp44.64MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/08. Session fixation.mp44.59MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/03. Never trust users.mp44.46MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/03. Password requirements.mp44.35MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/07. Blacklisting and whitelisting.mp44.13MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/08. Map exposure points and data passageways.mp43.64MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/06. Protecting cookies.mp43.63MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/02. Simple is more secure.mp43.61MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/01. Regulating requests.mp43.58MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/06. Security through obscurity.mp43.55MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/05. Defense in depth.mp43.55MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/07. Keeping error messages vague.mp43.48MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/04. Buffer overflows.mp43.4MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/01. What is security.mp43.3MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/10. File-upload abuse.mp43.23MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/04. Expect the unexpected.mp42.96MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/04. Labeling variables.mp42.96MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/03. Conversions and transformations.mp42.9MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/7. Conclusion/01. Goodbye.mp41.47MB