本站已收录 番号和无损神作磁力链接/BT种子 

Lynda - JavaScript - Security Essentials [AhLaN]

种子简介

种子名称: Lynda - JavaScript - Security Essentials [AhLaN]
文件类型: 视频
文件数目: 24个文件
文件大小: 155.01 MB
收录时间: 2022-4-15 13:49
已经下载: 3
资源热度: 171
最近下载: 2024-6-8 00:11

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:d3efab48c5b92b20a2c621a78d86e86908f2839c&dn=Lynda - JavaScript - Security Essentials [AhLaN] 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Lynda - JavaScript - Security Essentials [AhLaN].torrent
  • 1 - Introduction/01 - Build effective and secure JavaScript applications.mp421.42MB
  • 1 - Introduction/02 - What you should know.mp42.42MB
  • 2 - 1. Overview of Security Concepts/03 - Overview of the most common threats.mp42.95MB
  • 2 - 1. Overview of Security Concepts/04 - List of available resources.mp48.57MB
  • 2 - 1. Overview of Security Concepts/05 - Overview of this course's approach.mp41.67MB
  • 3 - 2. Security Applied - XSS/06 - What is cross-site scripting (XSS).mp45.13MB
  • 3 - 2. Security Applied - XSS/07 - Example of XSS in code.mp418.21MB
  • 3 - 2. Security Applied - XSS/08 - Final syntax applied XSS.mp419.31MB
  • 3 - 2. Security Applied - XSS/09 - Best practices for XSS threats.mp43.6MB
  • 4 - 3. Security Applied - CSRF/10 - What is cross-site request forgery (CSRF).mp43.11MB
  • 4 - 3. Security Applied - CSRF/11 - Overview of JSON Web Token (JWT).mp43.82MB
  • 4 - 3. Security Applied - CSRF/12 - Overview of Auth0.mp46.92MB
  • 4 - 3. Security Applied - CSRF/13 - Best practices for CSRF threats.mp42.36MB
  • 5 - 4. Security Applied - Sensitive Data/14 - What are sensitive data risks.mp42.54MB
  • 5 - 4. Security Applied - Sensitive Data/15 - Overview of the encryption.mp42.45MB
  • 5 - 4. Security Applied - Sensitive Data/16 - List of the crypto libraries.mp47.37MB
  • 5 - 4. Security Applied - Sensitive Data/17 - Best practices for sensitive data.mp43.95MB
  • 6 - 5. Security Applied - SSJI/18 - What is server-side JavaScript injection (SSJI).mp42.57MB
  • 6 - 5. Security Applied - SSJI/19 - Example of SSJI code.mp48.44MB
  • 6 - 5. Security Applied - SSJI/20 - How to prevent SSJI.mp43.72MB
  • 7 - 6. Security Applied - Obfuscation/21 - What is obfuscation.mp45.46MB
  • 7 - 6. Security Applied - Obfuscation/22 - Tools for scrambling your data.mp411.52MB
  • 7 - 6. Security Applied - Obfuscation/23 - Best practices for scrambling data.mp42.5MB
  • 8 - Conclusion/24 - Next steps.mp44.99MB