589689.xyz

- Web Security and the OWASP Top 10 - The Big Picture

  • 收录时间:2018-03-17 22:16:36
  • 文件大小:269MB
  • 下载次数:197
  • 最近下载:2021-01-02 01:38:48
  • 磁力链接:

文件列表

  1. 01. Introduction/01_01-Introduction.mp4 17MB
  2. 05. Insecure Direct Object References/05_03-Defences.mp4 11MB
  3. 04. Cross-Site Scripting (XSS)/04_01-Overview.mp4 10MB
  4. 04. Cross-Site Scripting (XSS)/04_04-The risk in Practice.mp4 10MB
  5. 03. Broken Authentication and Session Management/03_03-Defences.mp4 10MB
  6. 02. Injection/02_03-Defences.mp4 10MB
  7. 03. Broken Authentication and Session Management/03_02-Mounting an Attack.mp4 9MB
  8. 07. Sensitive Data Exposure/07_02-Mounting an Attack.mp4 9MB
  9. 08. Missing Function Level Access Control/08_03-Defences.mp4 9MB
  10. 02. Injection/02_01-Overview.mp4 8MB
  11. 09. Cross-Site Request Forgery (CSRF)/09_03-Defences.mp4 8MB
  12. 11. Unvalidated Redirects and Forwards/11_04-The risk in Practice.mp4 8MB
  13. 06. Security Misconfiguration/06_03-Defences.mp4 7MB
  14. 07. Sensitive Data Exposure/07_03-Defences.mp4 7MB
  15. 08. Missing Function Level Access Control/08_02-Mounting an Attack.mp4 7MB
  16. 06. Security Misconfiguration/06_02-Mounting an Attack.mp4 6MB
  17. 09. Cross-Site Request Forgery (CSRF)/09_01-Overview.mp4 6MB
  18. 08. Missing Function Level Access Control/08_04-The risk in Practice.mp4 6MB
  19. 09. Cross-Site Request Forgery (CSRF)/09_04-The risk in Practice.mp4 6MB
  20. 08. Missing Function Level Access Control/08_01-Overview.mp4 6MB
  21. 10. Using Components with Known Vulnerabilities/10_03-Defences.mp4 6MB
  22. 04. Cross-Site Scripting (XSS)/04_03-Defences.mp4 6MB
  23. 03. Broken Authentication and Session Management/03_01-Overview.mp4 5MB
  24. 10. Using Components with Known Vulnerabilities/10_01-Overview.mp4 5MB
  25. 02. Injection/02_04-The risk in Practice.mp4 5MB
  26. 09. Cross-Site Request Forgery (CSRF)/09_02-Mounting an Attack.mp4 5MB
  27. 07. Sensitive Data Exposure/07_04-The risk in Practice.mp4 5MB
  28. 05. Insecure Direct Object References/05_01-Overview.mp4 5MB
  29. 02. Injection/02_02-Mounting an Attack.mp4 5MB
  30. 10. Using Components with Known Vulnerabilities/10_04-The risk in Practice.mp4 5MB
  31. 11. Unvalidated Redirects and Forwards/11_01-Overview.mp4 5MB
  32. 07. Sensitive Data Exposure/07_01-Overview.mp4 5MB
  33. 11. Unvalidated Redirects and Forwards/11_02-Mounting an Attack.mp4 5MB
  34. 06. Security Misconfiguration/06_04-The risk in Practice.mp4 5MB
  35. 11. Unvalidated Redirects and Forwards/11_03-Defences.mp4 5MB
  36. 10. Using Components with Known Vulnerabilities/10_02-Mounting an Attack.mp4 4MB
  37. 04. Cross-Site Scripting (XSS)/04_02-Mounting an Attack.mp4 4MB
  38. 05. Insecure Direct Object References/05_02-Mounting an Attack.mp4 4MB
  39. 06. Security Misconfiguration/06_01-Overview.mp4 4MB
  40. 05. Insecure Direct Object References/05_04-The risk in Practice.mp4 4MB
  41. 03. Broken Authentication and Session Management/03_04-The risk in Practice.mp4 4MB