589689.xyz

MongoDB Security

  • 收录时间:2018-03-18 22:29:14
  • 文件大小:818MB
  • 下载次数:161
  • 最近下载:2020-12-27 02:12:40
  • 磁力链接:

文件列表

  1. 1. Authentication/03 - Detailed authentication mechanisms.mp4 42MB
  2. 2. Authorization and Encryption/03 - Built-in roles.mp4 38MB
  3. 1. Authentication/10 - Enable Kerberos.mp4 36MB
  4. 3. Auditing and Best Practices/10 - Security checklists.mp4 36MB
  5. 1. Authentication/06 - Authentication on sharded clusters.mp4 36MB
  6. 3. Auditing and Best Practices/07 - Example of a DDL audit filter.mp4 32MB
  7. 2. Authorization and Encryption/09 - List user roles and privileges.mp4 28MB
  8. 2. Authorization and Encryption/23 - Enable TLS within a replica set.mp4 26MB
  9. 1. Authentication/05 - Authentication methods.mp4 24MB
  10. 2. Authorization and Encryption/25 - Encrypted storage engine.mp4 24MB
  11. 2. Authorization and Encryption/07 - Privileges.mp4 24MB
  12. Introduction/01 - Welcome.mp4 23MB
  13. 1. Authentication/11 - Enable keyfile-based replica set internal authentication.mp4 23MB
  14. 2. Authorization and Encryption/05 - Actions.mp4 19MB
  15. 1. Authentication/12 - Enable replica set X.509 internal authentication.mp4 19MB
  16. 3. Auditing and Best Practices/03 - Configuring an audit from the command line.mp4 19MB
  17. 1. Authentication/13 - Migrate from MONGODB-CR to SCRAM-SHA-1.mp4 18MB
  18. 1. Authentication/08 - Enable X.509.mp4 18MB
  19. 2. Authorization and Encryption/24 - Enable mixed TLS with encrypted nodes in a replica set.mp4 17MB
  20. 2. Authorization and Encryption/13 - Creating an intern user.mp4 17MB
  21. 1. Authentication/07 - Enable SCRAM-SHA-1.mp4 16MB
  22. 1. Authentication/09 - Enable LDAP.mp4 16MB
  23. 2. Authorization and Encryption/22 - Enable TLS between client and mongod.mp4 15MB
  24. 2. Authorization and Encryption/01 - Authorization model.mp4 15MB
  25. 2. Authorization and Encryption/16 - Grant new privileges to role.mp4 15MB
  26. 3. Auditing and Best Practices/09 - Enabling auditAuthorizationSuccess.mp4 15MB
  27. 3. Auditing and Best Practices/02 - Auditing output format.mp4 15MB
  28. 2. Authorization and Encryption/06 - Resources.mp4 14MB
  29. 2. Authorization and Encryption/15 - Create a user with the user-defined role.mp4 14MB
  30. 2. Authorization and Encryption/26 - KMIP integration.mp4 14MB
  31. 3. Auditing and Best Practices/05 - Enabling the first audit filter.mp4 13MB
  32. 2. Authorization and Encryption/11 - Unauthorized operation message.mp4 13MB
  33. 3. Auditing and Best Practices/11 - Security reports.mp4 13MB
  34. 2. Authorization and Encryption/04 - User-defined roles.mp4 11MB
  35. 2. Authorization and Encryption/10 - Create a sys admin.mp4 11MB
  36. 2. Authorization and Encryption/21 - TLS connection modes.mp4 8MB
  37. 2. Authorization and Encryption/20 - Transport encryption (TLS).mp4 7MB
  38. 2. Authorization and Encryption/17 - Update grant from all databases to sample database.mp4 7MB
  39. 3. Auditing and Best Practices/06 - DDL operations definition.mp4 7MB
  40. 3. Auditing and Best Practices/04 - Definition of filters.mp4 7MB
  41. 2. Authorization and Encryption/02 - Role-based access control.mp4 6MB
  42. 1. Authentication/04 - Localhost exception.mp4 6MB
  43. 1. Authentication/01 - Authentication vs. authorization.mp4 6MB
  44. 3. Auditing and Best Practices/01 - Describe auditing capabilities.mp4 5MB
  45. 2. Authorization and Encryption/18 - Revoke a privilege from a role.mp4 5MB
  46. 2. Authorization and Encryption/08 - Create a user with the built-in role.mp4 5MB
  47. 3. Auditing and Best Practices/08 - DML operations definition.mp4 5MB
  48. 2. Authorization and Encryption/12 - Update a user role.mp4 5MB
  49. 2. Authorization and Encryption/19 - Encryption intro.mp4 4MB
  50. 2. Authorization and Encryption/14 - Create a user-defined role.mp4 4MB
  51. 1. Authentication/02 - Authentication mechanisms.mp4 2MB
  52. 3. Auditing and Best Practices/10 - Security checklists.en.srt 16KB
  53. 1. Authentication/03 - Detailed authentication mechanisms.en.srt 13KB
  54. 2. Authorization and Encryption/03 - Built-in roles.en.srt 13KB
  55. 1. Authentication/10 - Enable Kerberos.en.srt 11KB
  56. 1. Authentication/06 - Authentication on sharded clusters.en.srt 10KB
  57. 3. Auditing and Best Practices/07 - Example of a DDL audit filter.en.srt 10KB
  58. 1. Authentication/09 - Enable LDAP.en.srt 10KB
  59. 2. Authorization and Encryption/25 - Encrypted storage engine.en.srt 9KB
  60. 1. Authentication/08 - Enable X.509.en.srt 8KB
  61. 1. Authentication/11 - Enable keyfile-based replica set internal authentication.en.srt 8KB
  62. 1. Authentication/05 - Authentication methods.en.srt 7KB
  63. 2. Authorization and Encryption/09 - List user roles and privileges.en.srt 7KB
  64. 2. Authorization and Encryption/07 - Privileges.en.srt 7KB
  65. 2. Authorization and Encryption/23 - Enable TLS within a replica set.en.srt 6KB
  66. 3. Auditing and Best Practices/03 - Configuring an audit from the command line.en.srt 6KB
  67. 2. Authorization and Encryption/05 - Actions.en.srt 6KB
  68. 2. Authorization and Encryption/13 - Creating an intern user.en.srt 5KB
  69. 1. Authentication/07 - Enable SCRAM-SHA-1.en.srt 5KB
  70. 3. Auditing and Best Practices/11 - Security reports.en.srt 5KB
  71. 1. Authentication/12 - Enable replica set X.509 internal authentication.en.srt 5KB
  72. 2. Authorization and Encryption/24 - Enable mixed TLS with encrypted nodes in a replica set.en.srt 5KB
  73. 2. Authorization and Encryption/22 - Enable TLS between client and mongod.en.srt 5KB
  74. 2. Authorization and Encryption/11 - Unauthorized operation message.en.srt 5KB
  75. 2. Authorization and Encryption/15 - Create a user with the user-defined role.en.srt 5KB
  76. 1. Authentication/04 - Localhost exception.en.srt 5KB
  77. 1. Authentication/13 - Migrate from MONGODB-CR to SCRAM-SHA-1.en.srt 4KB
  78. 3. Auditing and Best Practices/05 - Enabling the first audit filter.en.srt 4KB
  79. 3. Auditing and Best Practices/02 - Auditing output format.en.srt 4KB
  80. 2. Authorization and Encryption/01 - Authorization model.en.srt 4KB
  81. 2. Authorization and Encryption/06 - Resources.en.srt 4KB
  82. 3. Auditing and Best Practices/09 - Enabling auditAuthorizationSuccess.en.srt 4KB
  83. 2. Authorization and Encryption/16 - Grant new privileges to role.en.srt 4KB
  84. 2. Authorization and Encryption/04 - User-defined roles.en.srt 4KB
  85. 2. Authorization and Encryption/26 - KMIP integration.en.srt 4KB
  86. 2. Authorization and Encryption/10 - Create a sys admin.en.srt 3KB
  87. 3. Auditing and Best Practices/04 - Definition of filters.en.srt 3KB
  88. 2. Authorization and Encryption/21 - TLS connection modes.en.srt 3KB
  89. 2. Authorization and Encryption/20 - Transport encryption (TLS).en.srt 3KB
  90. 3. Auditing and Best Practices/06 - DDL operations definition.en.srt 2KB
  91. 2. Authorization and Encryption/02 - Role-based access control.en.srt 2KB
  92. 3. Auditing and Best Practices/01 - Describe auditing capabilities.en.srt 2KB
  93. 1. Authentication/02 - Authentication mechanisms.en.srt 2KB
  94. Introduction/01 - Welcome.en.srt 2KB
  95. 2. Authorization and Encryption/08 - Create a user with the built-in role.en.srt 2KB
  96. 2. Authorization and Encryption/17 - Update grant from all databases to sample database.en.srt 2KB
  97. 1. Authentication/01 - Authentication vs. authorization.en.srt 2KB
  98. 2. Authorization and Encryption/18 - Revoke a privilege from a role.en.srt 2KB
  99. 3. Auditing and Best Practices/08 - DML operations definition.en.srt 2KB
  100. 2. Authorization and Encryption/19 - Encryption intro.en.srt 1KB
  101. 2. Authorization and Encryption/12 - Update a user role.en.srt 1KB
  102. 2. Authorization and Encryption/14 - Create a user-defined role.en.srt 1KB