种子简介
种子名称:
Pluralsight - Web Security and the OWASP Top 10 - The Big Picture
文件类型:
视频
文件数目:
41个文件
文件大小:
269.47 MB
收录时间:
2017-2-25 11:53
已经下载:
3次
资源热度:
186
最近下载:
2025-2-19 13:09
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:650d4c0f9b99d088ab724eb1255ad9a85030a0fd&dn=Pluralsight - Web Security and the OWASP Top 10 - The Big Picture
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Pluralsight - Web Security and the OWASP Top 10 - The Big Picture.torrent
02. Injection/02_04-The risk in Practice.mp45.29MB
02. Injection/02_03-Defences.mp49.67MB
02. Injection/02_02-Mounting an Attack.mp45.02MB
02. Injection/02_01-Overview.mp48.22MB
01. Introduction/01_01-Introduction.mp416.94MB
07. Sensitive Data Exposure/07_01-Overview.mp44.8MB
07. Sensitive Data Exposure/07_02-Mounting an Attack.mp48.9MB
07. Sensitive Data Exposure/07_04-The risk in Practice.mp45.18MB
07. Sensitive Data Exposure/07_03-Defences.mp46.67MB
06. Security Misconfiguration/06_02-Mounting an Attack.mp46.26MB
06. Security Misconfiguration/06_01-Overview.mp44.08MB
06. Security Misconfiguration/06_03-Defences.mp46.82MB
06. Security Misconfiguration/06_04-The risk in Practice.mp44.63MB
04. Cross-Site Scripting (XSS)/04_03-Defences.mp45.66MB
04. Cross-Site Scripting (XSS)/04_02-Mounting an Attack.mp44.3MB
04. Cross-Site Scripting (XSS)/04_04-The risk in Practice.mp410.03MB
04. Cross-Site Scripting (XSS)/04_01-Overview.mp410.24MB
05. Insecure Direct Object References/05_01-Overview.mp45.17MB
09. Cross-Site Request Forgery (CSRF)/09_03-Defences.mp47.86MB
05. Insecure Direct Object References/05_02-Mounting an Attack.mp44.26MB
09. Cross-Site Request Forgery (CSRF)/09_01-Overview.mp46.17MB
09. Cross-Site Request Forgery (CSRF)/09_02-Mounting an Attack.mp45.19MB
05. Insecure Direct Object References/05_04-The risk in Practice.mp43.82MB
05. Insecure Direct Object References/05_03-Defences.mp410.95MB
09. Cross-Site Request Forgery (CSRF)/09_04-The risk in Practice.mp45.88MB
11. Unvalidated Redirects and Forwards/11_03-Defences.mp44.62MB
11. Unvalidated Redirects and Forwards/11_04-The risk in Practice.mp47.63MB
11. Unvalidated Redirects and Forwards/11_02-Mounting an Attack.mp44.63MB
11. Unvalidated Redirects and Forwards/11_01-Overview.mp44.8MB
08. Missing Function Level Access Control/08_03-Defences.mp48.73MB
08. Missing Function Level Access Control/08_04-The risk in Practice.mp46.01MB
08. Missing Function Level Access Control/08_01-Overview.mp45.81MB
08. Missing Function Level Access Control/08_02-Mounting an Attack.mp46.54MB
10. Using Components with Known Vulnerabilities/10_03-Defences.mp45.72MB
10. Using Components with Known Vulnerabilities/10_04-The risk in Practice.mp44.9MB
10. Using Components with Known Vulnerabilities/10_02-Mounting an Attack.mp44.44MB
10. Using Components with Known Vulnerabilities/10_01-Overview.mp45.37MB
03. Broken Authentication and Session Management/03_01-Overview.mp45.42MB
03. Broken Authentication and Session Management/03_04-The risk in Practice.mp43.71MB
03. Broken Authentication and Session Management/03_02-Mounting an Attack.mp49.25MB
03. Broken Authentication and Session Management/03_03-Defences.mp49.89MB