搜索
API Security with the OWASP API Security Top 10
磁力链接/BT种子名称
API Security with the OWASP API Security Top 10
磁力链接/BT种子简介
种子哈希:
015b42820b8f182641c6fb4c5c353ea9a76a4868
文件大小:
242.8M
已经下载:
886
次
下载速度:
极快
收录时间:
2024-04-26
最近下载:
2025-10-18
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:015B42820B8F182641C6FB4C5C353EA9A76A4868
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
51动漫
91短视频
抖音Max
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
最近搜索
极品白虎粉穴
dass-720
021213_530
展示鲍鱼
holford
artofzoo fantazi
仙逆110
dass-702
发给大哥
cg同人
主题摄像头
南條
ass-702
制片厂
吊带 内射
tanhuabt
电影
mida-325
#yeonwoo
jdsy038
丝 合集
lacumslut
充值
fc2 ppv
小草神
商
dd
深喉喉射
精神小妹对白
绝叫
文件列表
owasp-api-security-top-10.zip
25.5 MB
07. Broken Function Level Authorization/02. Demo- Exploiting Broken Function Level Authorization.mp4
11.4 MB
04. Broken Authentication/04. Demo- Common JWT Attacks.mp4
11.2 MB
10. Security Misconfiguration/04. Misconfiguration in the API and Response Chain.mp4
11.2 MB
03. Broken Object Level Authorization/03. Demo- Broken Object Level Attacks.mp4
11.0 MB
02. Understanding the OWASP API Security Top 10/01. Using the OWASP API Security Top 10.mp4
10.9 MB
04. Broken Authentication/02. Password Based Attacks and Defenses.mp4
10.2 MB
11. Improper Inventory Management/03. Attacks and Defenses.mp4
9.6 MB
12. Unsafe Consumption of APIs/03. API Consumption Defenses.mp4
9.0 MB
04. Broken Authentication/03. Other Attacks and Defenses.mp4
8.3 MB
02. Understanding the OWASP API Security Top 10/02. Metrics behind the Top 10 Risks.mp4
7.8 MB
08. Unrestricted Access to Sensitive Business Flows/01. Sensitive Business Flows and Potential Attacks.mp4
6.9 MB
10. Security Misconfiguration/03. Server Environment Misconfigurations.mp4
6.8 MB
05. Broken Object Property Level Authorization/03. Demo- Exploiting Object Properties.mp4
6.7 MB
09. Server-side Request Forgery/01. Understanding Server-side Request Forgery.mp4
6.7 MB
06. Unrestricted Resource Consumption/01. Unrestricted Resource Consumption Attacks.mp4
6.7 MB
08. Unrestricted Access to Sensitive Business Flows/03. Business Flow Defenses.mp4
6.4 MB
11. Improper Inventory Management/01. Understanding Improper Inventory Management.mp4
6.3 MB
07. Broken Function Level Authorization/03. Defenses.mp4
6.1 MB
08. Unrestricted Access to Sensitive Business Flows/02. Demo- Attacking an Unrestricted Business Flow.mp4
6.1 MB
06. Unrestricted Resource Consumption/02. Defenses for Resource Consumption.mp4
5.8 MB
07. Broken Function Level Authorization/01. Attacking Broken Function Level Authorization.mp4
5.6 MB
10. Security Misconfiguration/01. Misconfiguration and Patching.mp4
5.6 MB
09. Server-side Request Forgery/03. SSRF Defenses.mp4
5.5 MB
03. Broken Object Level Authorization/02. Object Level Attacks.mp4
5.0 MB
11. Improper Inventory Management/02. Demo- Deprecated Functionality.mp4
4.6 MB
09. Server-side Request Forgery/02. Demo- Forging Requests from the Server.mp4
4.5 MB
12. Unsafe Consumption of APIs/01. Understanding Unsafe Consumption of APIs.mp4
4.2 MB
01. Course Overview/01. Course Overview.mp4
4.2 MB
05. Broken Object Property Level Authorization/01. Understanding Broken Object Property Level Authorization.mp4
4.1 MB
05. Broken Object Property Level Authorization/02. Object Property Attacks and Defenses.mp4
3.9 MB
03. Broken Object Level Authorization/04. Examining Defenses.mp4
3.7 MB
10. Security Misconfiguration/02. HTTP Request Chain Misconfigurations.mp4
3.6 MB
03. Broken Object Level Authorization/01. Understanding Broken Object Level Authorization.mp4
3.3 MB
04. Broken Authentication/01. Understanding Broken Authentication.mp4
3.3 MB
12. Unsafe Consumption of APIs/02. API Consumption Attacks.mp4
2.7 MB
10. Security Misconfiguration/04. Misconfiguration in the API and Response Chain.srt
9.8 kB
11. Improper Inventory Management/03. Attacks and Defenses.srt
7.9 kB
04. Broken Authentication/02. Password Based Attacks and Defenses.srt
7.8 kB
02. Understanding the OWASP API Security Top 10/01. Using the OWASP API Security Top 10.srt
7.7 kB
12. Unsafe Consumption of APIs/03. API Consumption Defenses.srt
7.5 kB
04. Broken Authentication/03. Other Attacks and Defenses.srt
6.5 kB
02. Understanding the OWASP API Security Top 10/02. Metrics behind the Top 10 Risks.srt
6.4 kB
08. Unrestricted Access to Sensitive Business Flows/03. Business Flow Defenses.srt
5.6 kB
08. Unrestricted Access to Sensitive Business Flows/01. Sensitive Business Flows and Potential Attacks.srt
5.4 kB
09. Server-side Request Forgery/01. Understanding Server-side Request Forgery.srt
5.2 kB
04. Broken Authentication/04. Demo- Common JWT Attacks.srt
5.2 kB
06. Unrestricted Resource Consumption/01. Unrestricted Resource Consumption Attacks.srt
4.9 kB
10. Security Misconfiguration/01. Misconfiguration and Patching.srt
4.8 kB
11. Improper Inventory Management/01. Understanding Improper Inventory Management.srt
4.7 kB
07. Broken Function Level Authorization/01. Attacking Broken Function Level Authorization.srt
4.7 kB
07. Broken Function Level Authorization/03. Defenses.srt
4.6 kB
06. Unrestricted Resource Consumption/02. Defenses for Resource Consumption.srt
4.5 kB
10. Security Misconfiguration/03. Server Environment Misconfigurations.srt
4.5 kB
09. Server-side Request Forgery/03. SSRF Defenses.srt
4.3 kB
03. Broken Object Level Authorization/02. Object Level Attacks.srt
4.1 kB
05. Broken Object Property Level Authorization/03. Demo- Exploiting Object Properties.srt
4.0 kB
03. Broken Object Level Authorization/03. Demo- Broken Object Level Attacks.srt
3.7 kB
07. Broken Function Level Authorization/02. Demo- Exploiting Broken Function Level Authorization.srt
3.6 kB
12. Unsafe Consumption of APIs/01. Understanding Unsafe Consumption of APIs.srt
3.6 kB
05. Broken Object Property Level Authorization/02. Object Property Attacks and Defenses.srt
3.5 kB
09. Server-side Request Forgery/02. Demo- Forging Requests from the Server.srt
3.4 kB
10. Security Misconfiguration/02. HTTP Request Chain Misconfigurations.srt
3.2 kB
05. Broken Object Property Level Authorization/01. Understanding Broken Object Property Level Authorization.srt
3.2 kB
08. Unrestricted Access to Sensitive Business Flows/02. Demo- Attacking an Unrestricted Business Flow.srt
3.1 kB
11. Improper Inventory Management/02. Demo- Deprecated Functionality.srt
2.9 kB
03. Broken Object Level Authorization/04. Examining Defenses.srt
2.7 kB
04. Broken Authentication/01. Understanding Broken Authentication.srt
2.6 kB
12. Unsafe Consumption of APIs/02. API Consumption Attacks.srt
2.4 kB
01. Course Overview/01. Course Overview.srt
2.4 kB
03. Broken Object Level Authorization/01. Understanding Broken Object Level Authorization.srt
2.3 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!