zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Pluralsight - Web Security and the OWASP Top 10 - The Big Picture
magnet:?xt=urn:btih:650d4c0f9b99d088ab724eb1255ad9a85030a0fd&dn=Pluralsight - Web Security and the OWASP Top 10 - The Big Picture
磁力链接详情
文件列表详情
650d4c0f9b99d088ab724eb1255ad9a85030a0fd
infohash:
41
文件数量
269.47 MB
文件大小
2017-2-25 11:53
创建日期
2024-12-25 11:35
最后访问
相关分词
Pluralsight
-
Web
Security
and
the
OWASP
Top
10
-
The
Big
Picture
02. Injection/02_04-The risk in Practice.mp4 5.29 MB
02. Injection/02_03-Defences.mp4 9.67 MB
02. Injection/02_02-Mounting an Attack.mp4 5.02 MB
02. Injection/02_01-Overview.mp4 8.22 MB
01. Introduction/01_01-Introduction.mp4 16.94 MB
07. Sensitive Data Exposure/07_01-Overview.mp4 4.8 MB
07. Sensitive Data Exposure/07_02-Mounting an Attack.mp4 8.9 MB
07. Sensitive Data Exposure/07_04-The risk in Practice.mp4 5.18 MB
07. Sensitive Data Exposure/07_03-Defences.mp4 6.67 MB
06. Security Misconfiguration/06_02-Mounting an Attack.mp4 6.26 MB
06. Security Misconfiguration/06_01-Overview.mp4 4.08 MB
06. Security Misconfiguration/06_03-Defences.mp4 6.82 MB
06. Security Misconfiguration/06_04-The risk in Practice.mp4 4.63 MB
04. Cross-Site Scripting (XSS)/04_03-Defences.mp4 5.66 MB
04. Cross-Site Scripting (XSS)/04_02-Mounting an Attack.mp4 4.3 MB
04. Cross-Site Scripting (XSS)/04_04-The risk in Practice.mp4 10.03 MB
04. Cross-Site Scripting (XSS)/04_01-Overview.mp4 10.24 MB
05. Insecure Direct Object References/05_01-Overview.mp4 5.17 MB
09. Cross-Site Request Forgery (CSRF)/09_03-Defences.mp4 7.86 MB
05. Insecure Direct Object References/05_02-Mounting an Attack.mp4 4.26 MB
09. Cross-Site Request Forgery (CSRF)/09_01-Overview.mp4 6.17 MB
09. Cross-Site Request Forgery (CSRF)/09_02-Mounting an Attack.mp4 5.19 MB
05. Insecure Direct Object References/05_04-The risk in Practice.mp4 3.82 MB
05. Insecure Direct Object References/05_03-Defences.mp4 10.95 MB
09. Cross-Site Request Forgery (CSRF)/09_04-The risk in Practice.mp4 5.88 MB
11. Unvalidated Redirects and Forwards/11_03-Defences.mp4 4.62 MB
11. Unvalidated Redirects and Forwards/11_04-The risk in Practice.mp4 7.63 MB
11. Unvalidated Redirects and Forwards/11_02-Mounting an Attack.mp4 4.63 MB
11. Unvalidated Redirects and Forwards/11_01-Overview.mp4 4.8 MB
08. Missing Function Level Access Control/08_03-Defences.mp4 8.73 MB
08. Missing Function Level Access Control/08_04-The risk in Practice.mp4 6.01 MB
08. Missing Function Level Access Control/08_01-Overview.mp4 5.81 MB
08. Missing Function Level Access Control/08_02-Mounting an Attack.mp4 6.54 MB
10. Using Components with Known Vulnerabilities/10_03-Defences.mp4 5.72 MB
10. Using Components with Known Vulnerabilities/10_04-The risk in Practice.mp4 4.9 MB
10. Using Components with Known Vulnerabilities/10_02-Mounting an Attack.mp4 4.44 MB
10. Using Components with Known Vulnerabilities/10_01-Overview.mp4 5.37 MB
03. Broken Authentication and Session Management/03_01-Overview.mp4 5.42 MB
03. Broken Authentication and Session Management/03_04-The risk in Practice.mp4 3.71 MB
03. Broken Authentication and Session Management/03_02-Mounting an Attack.mp4 9.25 MB
03. Broken Authentication and Session Management/03_03-Defences.mp4 9.89 MB
其他位置