种子简介
种子名称:
Lynda - JavaScript - Security Essentials [AhLaN]
文件类型:
视频
文件数目:
24个文件
文件大小:
155.01 MB
收录时间:
2022-4-15 13:49
已经下载:
3次
资源热度:
216
最近下载:
2024-12-27 02:35
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:d3efab48c5b92b20a2c621a78d86e86908f2839c&dn=Lynda - JavaScript - Security Essentials [AhLaN]
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Lynda - JavaScript - Security Essentials [AhLaN].torrent
1 - Introduction/01 - Build effective and secure JavaScript applications.mp421.42MB
1 - Introduction/02 - What you should know.mp42.42MB
2 - 1. Overview of Security Concepts/03 - Overview of the most common threats.mp42.95MB
2 - 1. Overview of Security Concepts/04 - List of available resources.mp48.57MB
2 - 1. Overview of Security Concepts/05 - Overview of this course's approach.mp41.67MB
3 - 2. Security Applied - XSS/06 - What is cross-site scripting (XSS).mp45.13MB
3 - 2. Security Applied - XSS/07 - Example of XSS in code.mp418.21MB
3 - 2. Security Applied - XSS/08 - Final syntax applied XSS.mp419.31MB
3 - 2. Security Applied - XSS/09 - Best practices for XSS threats.mp43.6MB
4 - 3. Security Applied - CSRF/10 - What is cross-site request forgery (CSRF).mp43.11MB
4 - 3. Security Applied - CSRF/11 - Overview of JSON Web Token (JWT).mp43.82MB
4 - 3. Security Applied - CSRF/12 - Overview of Auth0.mp46.92MB
4 - 3. Security Applied - CSRF/13 - Best practices for CSRF threats.mp42.36MB
5 - 4. Security Applied - Sensitive Data/14 - What are sensitive data risks.mp42.54MB
5 - 4. Security Applied - Sensitive Data/15 - Overview of the encryption.mp42.45MB
5 - 4. Security Applied - Sensitive Data/16 - List of the crypto libraries.mp47.37MB
5 - 4. Security Applied - Sensitive Data/17 - Best practices for sensitive data.mp43.95MB
6 - 5. Security Applied - SSJI/18 - What is server-side JavaScript injection (SSJI).mp42.57MB
6 - 5. Security Applied - SSJI/19 - Example of SSJI code.mp48.44MB
6 - 5. Security Applied - SSJI/20 - How to prevent SSJI.mp43.72MB
7 - 6. Security Applied - Obfuscation/21 - What is obfuscation.mp45.46MB
7 - 6. Security Applied - Obfuscation/22 - Tools for scrambling your data.mp411.52MB
7 - 6. Security Applied - Obfuscation/23 - Best practices for scrambling data.mp42.5MB
8 - Conclusion/24 - Next steps.mp44.99MB