本站已收录 番号和无损神作磁力链接/BT种子 

Pluralsight - Web Security and the OWASP Top 10 - The Big Picture

种子简介

种子名称: Pluralsight - Web Security and the OWASP Top 10 - The Big Picture
文件类型: 视频
文件数目: 41个文件
文件大小: 269.47 MB
收录时间: 2017-2-25 11:53
已经下载: 3
资源热度: 140
最近下载: 2024-9-7 09:48

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:650d4c0f9b99d088ab724eb1255ad9a85030a0fd&dn=Pluralsight - Web Security and the OWASP Top 10 - The Big Picture 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Pluralsight - Web Security and the OWASP Top 10 - The Big Picture.torrent
  • 02. Injection/02_04-The risk in Practice.mp45.29MB
  • 02. Injection/02_03-Defences.mp49.67MB
  • 02. Injection/02_02-Mounting an Attack.mp45.02MB
  • 02. Injection/02_01-Overview.mp48.22MB
  • 01. Introduction/01_01-Introduction.mp416.94MB
  • 07. Sensitive Data Exposure/07_01-Overview.mp44.8MB
  • 07. Sensitive Data Exposure/07_02-Mounting an Attack.mp48.9MB
  • 07. Sensitive Data Exposure/07_04-The risk in Practice.mp45.18MB
  • 07. Sensitive Data Exposure/07_03-Defences.mp46.67MB
  • 06. Security Misconfiguration/06_02-Mounting an Attack.mp46.26MB
  • 06. Security Misconfiguration/06_01-Overview.mp44.08MB
  • 06. Security Misconfiguration/06_03-Defences.mp46.82MB
  • 06. Security Misconfiguration/06_04-The risk in Practice.mp44.63MB
  • 04. Cross-Site Scripting (XSS)/04_03-Defences.mp45.66MB
  • 04. Cross-Site Scripting (XSS)/04_02-Mounting an Attack.mp44.3MB
  • 04. Cross-Site Scripting (XSS)/04_04-The risk in Practice.mp410.03MB
  • 04. Cross-Site Scripting (XSS)/04_01-Overview.mp410.24MB
  • 05. Insecure Direct Object References/05_01-Overview.mp45.17MB
  • 09. Cross-Site Request Forgery (CSRF)/09_03-Defences.mp47.86MB
  • 05. Insecure Direct Object References/05_02-Mounting an Attack.mp44.26MB
  • 09. Cross-Site Request Forgery (CSRF)/09_01-Overview.mp46.17MB
  • 09. Cross-Site Request Forgery (CSRF)/09_02-Mounting an Attack.mp45.19MB
  • 05. Insecure Direct Object References/05_04-The risk in Practice.mp43.82MB
  • 05. Insecure Direct Object References/05_03-Defences.mp410.95MB
  • 09. Cross-Site Request Forgery (CSRF)/09_04-The risk in Practice.mp45.88MB
  • 11. Unvalidated Redirects and Forwards/11_03-Defences.mp44.62MB
  • 11. Unvalidated Redirects and Forwards/11_04-The risk in Practice.mp47.63MB
  • 11. Unvalidated Redirects and Forwards/11_02-Mounting an Attack.mp44.63MB
  • 11. Unvalidated Redirects and Forwards/11_01-Overview.mp44.8MB
  • 08. Missing Function Level Access Control/08_03-Defences.mp48.73MB
  • 08. Missing Function Level Access Control/08_04-The risk in Practice.mp46.01MB
  • 08. Missing Function Level Access Control/08_01-Overview.mp45.81MB
  • 08. Missing Function Level Access Control/08_02-Mounting an Attack.mp46.54MB
  • 10. Using Components with Known Vulnerabilities/10_03-Defences.mp45.72MB
  • 10. Using Components with Known Vulnerabilities/10_04-The risk in Practice.mp44.9MB
  • 10. Using Components with Known Vulnerabilities/10_02-Mounting an Attack.mp44.44MB
  • 10. Using Components with Known Vulnerabilities/10_01-Overview.mp45.37MB
  • 03. Broken Authentication and Session Management/03_01-Overview.mp45.42MB
  • 03. Broken Authentication and Session Management/03_04-The risk in Practice.mp43.71MB
  • 03. Broken Authentication and Session Management/03_02-Mounting an Attack.mp49.25MB
  • 03. Broken Authentication and Session Management/03_03-Defences.mp49.89MB