搜索
[ DevCourseWeb.com ] Udemy - Secure coding in Java with Web Application Examples
磁力链接/BT种子名称
[ DevCourseWeb.com ] Udemy - Secure coding in Java with Web Application Examples
磁力链接/BT种子简介
种子哈希:
531c0a9e2c99f00d94d3dc321233c603d81c26d6
文件大小:
2.48G
已经下载:
780
次
下载速度:
极快
收录时间:
2024-04-10
最近下载:
2025-07-17
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:531C0A9E2C99F00D94D3DC321233C603D81C26D6
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
TikTok成人版
PornHub
草榴社区
哆哔涩漫
呦乐园
萝莉岛
最近搜索
【最美】
新作
ときめき
探花洗澡
重生
清纯眼镜
李美人
巨型
后拍极品
服务
卡卡
潮男
无水印原版
黑丝白袜
动漫
精品推荐
爸爸操我
高中 第二
内射 学生
手法
你的
白嫖啊提斯
模
母乳-uncensored
推特调教
java
藤井
热门事件
主播自慰
重磅福利
文件列表
~Get Your Files Here !/3. A012021-Broken Access Control/1. Broken Access Control.mp4
326.1 MB
~Get Your Files Here !/9. A072021-Identification and Authentication Failures/1. Identification & Authentication Failures.mp4
212.7 MB
~Get Your Files Here !/7. A052021-Security Misconfiguration/2. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4
202.0 MB
~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1. Vulnerable & Outdated Components.mp4
187.5 MB
~Get Your Files Here !/4. A022021-Cryptographic Failures/3. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4
161.7 MB
~Get Your Files Here !/4. A022021-Cryptographic Failures/2. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4
144.3 MB
~Get Your Files Here !/11. A092021-Security Logging and Monitoring Failures/1. Security Logging & Monitoring Failures.mp4
141.6 MB
~Get Your Files Here !/6. A042021-Insecure Design/2. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4
135.4 MB
~Get Your Files Here !/5. A032021-Injection/2. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4
132.7 MB
~Get Your Files Here !/12. A102021-Server-Side Request Forgery/1. Server-Side Request Forgery (SSRF).mp4
128.9 MB
~Get Your Files Here !/2. OWASP Top 10/1. OWASP Top 10 Overview.mp4
125.0 MB
~Get Your Files Here !/5. A032021-Injection/1. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4
117.1 MB
~Get Your Files Here !/10. A082021-Software and Data Integrity Failures/1. Software & Data Integrity Failures.mp4
109.3 MB
~Get Your Files Here !/6. A042021-Insecure Design/1. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4
107.1 MB
~Get Your Files Here !/7. A052021-Security Misconfiguration/1. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4
103.3 MB
~Get Your Files Here !/4. A022021-Cryptographic Failures/1. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4
98.2 MB
~Get Your Files Here !/5. A032021-Injection/3. Injection (XPath Injection, Log Injection, Input Validation).mp4
93.0 MB
~Get Your Files Here !/1. Introduction/1. Communication plan.mp4
51.5 MB
~Get Your Files Here !/1. Introduction/2. Unlimited access to 'Learn IT' application for students.mp4
46.6 MB
~Get Your Files Here !/13. Bonus Section/1. Bonus Lesson.mp4
38.9 MB
~Get Your Files Here !/3. A012021-Broken Access Control/1. Broken Access Control.srt
44.8 kB
~Get Your Files Here !/9. A072021-Identification and Authentication Failures/1. Identification & Authentication Failures.srt
39.0 kB
~Get Your Files Here !/7. A052021-Security Misconfiguration/2. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).srt
32.9 kB
~Get Your Files Here !/6. A042021-Insecure Design/2. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).srt
29.2 kB
~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1. Vulnerable & Outdated Components.srt
27.5 kB
~Get Your Files Here !/12. A102021-Server-Side Request Forgery/1. Server-Side Request Forgery (SSRF).srt
27.2 kB
~Get Your Files Here !/11. A092021-Security Logging and Monitoring Failures/1. Security Logging & Monitoring Failures.srt
26.6 kB
~Get Your Files Here !/6. A042021-Insecure Design/1. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).srt
24.0 kB
~Get Your Files Here !/4. A022021-Cryptographic Failures/2. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).srt
23.9 kB
~Get Your Files Here !/7. A052021-Security Misconfiguration/1. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).srt
23.0 kB
~Get Your Files Here !/2. OWASP Top 10/1. OWASP Top 10 Overview.srt
23.0 kB
~Get Your Files Here !/4. A022021-Cryptographic Failures/3. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).srt
22.0 kB
~Get Your Files Here !/10. A082021-Software and Data Integrity Failures/1. Software & Data Integrity Failures.srt
19.6 kB
~Get Your Files Here !/5. A032021-Injection/1. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).srt
19.3 kB
~Get Your Files Here !/5. A032021-Injection/2. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).srt
19.1 kB
~Get Your Files Here !/5. A032021-Injection/3. Injection (XPath Injection, Log Injection, Input Validation).srt
18.9 kB
~Get Your Files Here !/4. A022021-Cryptographic Failures/1. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).srt
16.0 kB
~Get Your Files Here !/1. Introduction/1. Communication plan.srt
6.3 kB
~Get Your Files Here !/1. Introduction/2. Unlimited access to 'Learn IT' application for students.srt
4.6 kB
~Get Your Files Here !/13. Bonus Section/1. Bonus Lesson.srt
4.4 kB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
~Get Your Files Here !/5. A032021-Injection/1.1 Source code examples from the lesson.html
219 Bytes
~Get Your Files Here !/5. A032021-Injection/2.1 Source code examples from the lesson.html
219 Bytes
~Get Your Files Here !/5. A032021-Injection/3.1 Source code examples from the lesson.html
219 Bytes
~Get Your Files Here !/3. A012021-Broken Access Control/1.1 Source code examples from the lesson.html
213 Bytes
~Get Your Files Here !/4. A022021-Cryptographic Failures/2.1 Source code examples from the lesson.html
212 Bytes
~Get Your Files Here !/4. A022021-Cryptographic Failures/3.1 Source code examples from the lesson.html
212 Bytes
Get Bonus Downloads Here.url
182 Bytes
~Get Your Files Here !/13. Bonus Section/1.6 Java Course From zero to first job.html
163 Bytes
~Get Your Files Here !/1. Introduction/1.9 Telegram Channel with Latest News, coupons and important information.html
157 Bytes
~Get Your Files Here !/13. Bonus Section/1.12 Telegram Channel with Latest News and important information.html
157 Bytes
~Get Your Files Here !/1. Introduction/2.1 Learn IT application in Play Market.html
145 Bytes
~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1.2 pom.xml from the lesson with OWASP plugin.html
144 Bytes
~Get Your Files Here !/7. A052021-Security Misconfiguration/1.1 NIST 800-123 - Guide to General Server Security.html
138 Bytes
~Get Your Files Here !/7. A052021-Security Misconfiguration/2.1 NIST 800-123 - Guide to General Server Security.html
138 Bytes
~Get Your Files Here !/11. A092021-Security Logging and Monitoring Failures/1.1 Computer Security Incident Handling Guide.html
135 Bytes
~Get Your Files Here !/7. A052021-Security Misconfiguration/1.2 NIST 800-207 - Zero Trust Architecture.html
134 Bytes
~Get Your Files Here !/7. A052021-Security Misconfiguration/2.2 NIST 800-207 - Zero Trust Architecture.html
134 Bytes
~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1.1 Dependency check plugin.html
134 Bytes
~Get Your Files Here !/1. Introduction/2.2 Page where you can generate FREE bonus code for your self to remove limits in Application.html
114 Bytes
~Get Your Files Here !/1. Introduction/1.6 LinkedIn of the Tutor.html
105 Bytes
~Get Your Files Here !/13. Bonus Section/1.8 LinkedIn Andrii PIatakha.html
105 Bytes
~Get Your Files Here !/1. Introduction/1.2 Facebook Page with Udemy Coupons from Learn IT University.html
104 Bytes
~Get Your Files Here !/13. Bonus Section/1.1 Facebook Page with Udemy Coupons from Learn IT University.html
104 Bytes
~Get Your Files Here !/13. Bonus Section/1.10 Public profile of Tutor with list of all courses - Andrii Piatakha.html
104 Bytes
~Get Your Files Here !/1. Introduction/1.3 Instagram of the Tutor.html
103 Bytes
~Get Your Files Here !/1. Introduction/1.7 LinkedIn IT-Bulls company - official page.html
103 Bytes
~Get Your Files Here !/13. Bonus Section/1.3 Free book about AI by Andrii Piatakha (sci-fi).html
103 Bytes
~Get Your Files Here !/13. Bonus Section/1.4 Instagram Andrii Piatakha.html
103 Bytes
~Get Your Files Here !/13. Bonus Section/1.9 LinkedIn IT-Bulls company - official page.html
103 Bytes
~Get Your Files Here !/1. Introduction/1.1 Facebook of the Tutor.html
101 Bytes
~Get Your Files Here !/13. Bonus Section/1.2 Facebook Andrii Piatakha.html
101 Bytes
~Get Your Files Here !/1. Introduction/1.8 Patreon account of the Tutor.html
100 Bytes
~Get Your Files Here !/13. Bonus Section/1.11 Support me on Patreon by getting access to EXCLUSIVE content.html
100 Bytes
~Get Your Files Here !/1. Introduction/1.10 Youtube channel with free lessons and blog.html
94 Bytes
~Get Your Files Here !/13. Bonus Section/1.13 Youtube channel with free lessons and blog.html
94 Bytes
~Get Your Files Here !/1. Introduction/1.5 Learn IT University Website.html
93 Bytes
~Get Your Files Here !/13. Bonus Section/1.7 Learn IT University Official Website.html
93 Bytes
~Get Your Files Here !/2. OWASP Top 10/1.1 Common Weakness Enumeration (CWE) - official website.html
93 Bytes
~Get Your Files Here !/1. Introduction/1.4 IT-Bulls Company Official Website.html
82 Bytes
~Get Your Files Here !/13. Bonus Section/1.5 IT-Bulls Company Official Website.html
81 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!