zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Lynda - Programming Foundations - Web Security [AhLaN]
magnet:?xt=urn:btih:7fd1a0812ac94ff8903a82f8417c67a70269dea9&dn=Lynda - Programming Foundations - Web Security [AhLaN]
磁力链接详情
文件列表详情
7fd1a0812ac94ff8903a82f8417c67a70269dea9
infohash:
36
文件数量
772.37 MB
文件大小
2020-8-10 21:37
创建日期
2025-1-1 08:52
最后访问
相关分词
Lynda
-
Programming
Foundations
-
Web
Security
AhLaN
4 - 3. Filter Input, Control Output/17 - Sanitize data.mp4 37.4 MB
1 - Introduction/01 - The importance of security.mp4 20.4 MB
2 - 1. Security Overview/02 - What is security.mp4 17.18 MB
2 - 1. Security Overview/03 - Why security matters.mp4 12.29 MB
2 - 1. Security Overview/04 - What is a hacker.mp4 18.48 MB
2 - 1. Security Overview/05 - Threat models.mp4 19.93 MB
2 - 1. Security Overview/06 - Total security is unachievable.mp4 16.8 MB
3 - 2. General Security Principles/07 - Least privilege.mp4 22.02 MB
3 - 2. General Security Principles/08 - Simple is more secure.mp4 17.32 MB
3 - 2. General Security Principles/09 - Never trust users.mp4 19.75 MB
3 - 2. General Security Principles/10 - Expect the unexpected.mp4 11.53 MB
3 - 2. General Security Principles/11 - Defense in depth.mp4 22.03 MB
3 - 2. General Security Principles/12 - Security through obscurity.mp4 23.32 MB
3 - 2. General Security Principles/13 - Deny lists and allow lists.mp4 20.38 MB
3 - 2. General Security Principles/14 - Map exposure points and data passageways.mp4 19.14 MB
4 - 3. Filter Input, Control Output/15 - Regulate requests.mp4 24.53 MB
4 - 3. Filter Input, Control Output/16 - Validate input.mp4 22.16 MB
4 - 3. Filter Input, Control Output/18 - Label variables.mp4 6.24 MB
4 - 3. Filter Input, Control Output/19 - Keep code private.mp4 14.74 MB
4 - 3. Filter Input, Control Output/20 - Keep credentials private.mp4 23.81 MB
4 - 3. Filter Input, Control Output/21 - Keep error messages vague.mp4 14.11 MB
4 - 3. Filter Input, Control Output/22 - Smart logging.mp4 18.2 MB
5 - 4. The Most Common Attacks/23 - Types of credential attacks.mp4 29.38 MB
5 - 4. The Most Common Attacks/24 - Strong passwords.mp4 28.09 MB
5 - 4. The Most Common Attacks/25 - URL manipulation and insecure direct object reference (IDOR).mp4 26.29 MB
5 - 4. The Most Common Attacks/26 - SQL injection.mp4 33.19 MB
5 - 4. The Most Common Attacks/27 - Cross-site scripting (XSS).mp4 34.34 MB
5 - 4. The Most Common Attacks/28 - Cross-site request forgery (CSRF).mp4 25.93 MB
5 - 4. The Most Common Attacks/29 - Cross-site request protections.mp4 22.75 MB
5 - 4. The Most Common Attacks/30 - Cookie visibility and theft.mp4 27.13 MB
5 - 4. The Most Common Attacks/31 - Session hijacking.mp4 33.96 MB
5 - 4. The Most Common Attacks/32 - Session fixation.mp4 17.88 MB
5 - 4. The Most Common Attacks/33 - Remote code execution.mp4 14.69 MB
5 - 4. The Most Common Attacks/34 - File upload abuse.mp4 13.7 MB
5 - 4. The Most Common Attacks/35 - Denial of service.mp4 29.32 MB
6 - Conclusion/36 - Next steps.mp4 13.96 MB
其他位置