zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Lynda - Ethical Hacking with JavaScript [AhLaN]
magnet:?xt=urn:btih:d7ace2508e961ef14d7b47c22506ade0ca23017d&dn=Lynda - Ethical Hacking with JavaScript [AhLaN]
磁力链接详情
文件列表详情
d7ace2508e961ef14d7b47c22506ade0ca23017d
infohash:
20
文件数量
89.74 MB
文件大小
2020-8-2 19:02
创建日期
2024-10-24 04:45
最后访问
相关分词
Lynda
-
Ethical
Hacking
with
JavaScript
AhLaN
2 - 2. Reconnaissance/09 - Introduction and setup for Retire.js.mp4 10.8 MB
1 - 1. Introduction and Setup/03 - What is ethical hacking.mp4 2.99 MB
1 - 1. Introduction and Setup/04 - Overview of the cyber kill chain.mp4 3.87 MB
1 - 1. Introduction and Setup/05 - Plan an attack strategy.mp4 3.39 MB
1 - 1. Introduction and Setup/06 - Base project setup.mp4 2.24 MB
2 - 2. Reconnaissance/07 - Reconnaissance introduction.mp4 5.88 MB
2 - 2. Reconnaissance/08 - Introduction and setup for Snyk.mp4 10.8 MB
0 - Welcome/02 - What you should know.mp4 2.14 MB
2 - 2. Reconnaissance/10 - Introduction to AppSensor.mp4 8.67 MB
2 - 2. Reconnaissance/11 - Review of the plan.mp4 1.7 MB
3 - 3. Top Security Threats/12 - Injection threat.mp4 4.53 MB
3 - 3. Top Security Threats/13 - Broken authentication.mp4 3.51 MB
3 - 3. Top Security Threats/14 - Sensitive data.mp4 1.98 MB
3 - 3. Top Security Threats/15 - XML external entities.mp4 2.49 MB
3 - 3. Top Security Threats/16 - Security misconfiguration.mp4 2.81 MB
3 - 3. Top Security Threats/17 - Insecure deserialization.mp4 2.2 MB
3 - 3. Top Security Threats/18 - Components with known vulnerabilities.mp4 2.76 MB
3 - 3. Top Security Threats/19 - Insufficient logging and monitoring.mp4 4.54 MB
4 - Conclusion/20 - Next steps.mp4 4.73 MB
0 - Welcome/01 - Ethical JavaScript hacking.mp4 7.7 MB
其他位置