首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
[ CourseLala.com ] API Security in Action video edition
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2021-12-12 09:53
2024-12-23 12:21
222
7.4 GB
139
磁力链接
magnet:?xt=urn:btih:9bfa08db4bb65cbdfa8e3ce04ff2db702a330c7a
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOjliZmEwOGRiNGJiNjVjYmRmYThlM2NlMDRmZjJkYjcwMmEzMzBjN2FaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
CourseLala
com
API
Security
in
Action
video
edition
文件列表
~Get Your Files Here !/001 - Part 1. Foundations.mp4
7.62MB
~Get Your Files Here !/002 - Chapter 1 What is API security.mp4
58.44MB
~Get Your Files Here !/003 - Chapter 1 What is an API.mp4
38.31MB
~Get Your Files Here !/004 - Chapter 1 API security in context.mp4
46.19MB
~Get Your Files Here !/005 - Chapter 1 Elements of API security.mp4
64.97MB
~Get Your Files Here !/006 - Chapter 1 Environments and threat models.mp4
42.67MB
~Get Your Files Here !/007 - Chapter 1 Security mechanisms.mp4
71.84MB
~Get Your Files Here !/008 - Chapter 1 Audit logging.mp4
49.85MB
~Get Your Files Here !/009 - Chapter 2 Secure API development.mp4
39.72MB
~Get Your Files Here !/010 - Chapter 2 Implementation overview.mp4
46.13MB
~Get Your Files Here !/011 - Chapter 2 Developing the REST API.mp4
51.11MB
~Get Your Files Here !/012 - Chapter 2 Injection attacks.mp4
52.14MB
~Get Your Files Here !/013 - Chapter 2 Preventing injection attacks.mp4
62.15MB
~Get Your Files Here !/014 - Chapter 2 Input validation.mp4
92.12MB
~Get Your Files Here !/015 - Chapter 2 Producing safe output.mp4
67.26MB
~Get Your Files Here !/016 - Chapter 2 Preventing XSS.mp4
65.04MB
~Get Your Files Here !/017 - Chapter 3 Securing the Natter API.mp4
56.75MB
~Get Your Files Here !/018 - Chapter 3 Rate-limiting with Guava.mp4
37.25MB
~Get Your Files Here !/019 - Chapter 3 Authentication to prevent spoofing.mp4
47.35MB
~Get Your Files Here !/020 - Chapter 3 Creating the password database.mp4
40.11MB
~Get Your Files Here !/021 - Chapter 3 Authenticating users.mp4
31.23MB
~Get Your Files Here !/022 - Chapter 3 Using encryption to keep data private.mp4
66.7MB
~Get Your Files Here !/023 - Chapter 3 Audit logging for accountability.mp4
58.44MB
~Get Your Files Here !/024 - Chapter 3 Access control.mp4
78.35MB
~Get Your Files Here !/025 - Chapter 3 Adding new members to a Natter space.mp4
46.69MB
~Get Your Files Here !/026 - Part 2. Token-based authentication.mp4
5.18MB
~Get Your Files Here !/027 - Chapter 4 Session cookie authentication.mp4
53.5MB
~Get Your Files Here !/028 - Chapter 4 Serving the HTML from the same origin.mp4
53.13MB
~Get Your Files Here !/029 - Chapter 4 Drawbacks of HTTP authentication.mp4
37.17MB
~Get Your Files Here !/030 - Chapter 4 Token-based authentication.mp4
68.92MB
~Get Your Files Here !/031 - Chapter 4 Session cookies.mp4
62.12MB
~Get Your Files Here !/032 - Chapter 4 Cookie security attributes.mp4
70.14MB
~Get Your Files Here !/033 - Chapter 4 Preventing Cross-Site Request Forgery attacks.mp4
69.18MB
~Get Your Files Here !/034 - Chapter 4 Hash-based double-submit cookies.mp4
48.76MB
~Get Your Files Here !/035 - Chapter 4 Double-submit cookies for the Natter API.mp4
82.64MB
~Get Your Files Here !/036 - Chapter 4 Building the Natter login UI.mp4
40.47MB
~Get Your Files Here !/037 - Chapter 4 Implementing logout.mp4
39.79MB
~Get Your Files Here !/038 - Chapter 5 Modern token-based authentication.mp4
45.99MB
~Get Your Files Here !/039 - Chapter 5 Adding CORS headers to the Natter API.mp4
50.35MB
~Get Your Files Here !/040 - Chapter 5 Tokens without cookies.mp4
77.18MB
~Get Your Files Here !/041 - Chapter 5 The Bearer authentication scheme.mp4
30.6MB
~Get Your Files Here !/042 - Chapter 5 Storing tokens in Web Storage.mp4
30.1MB
~Get Your Files Here !/043 - Chapter 5 Updating the CORS filter.mp4
44.39MB
~Get Your Files Here !/044 - Chapter 5 Hardening database token storage.mp4
70.67MB
~Get Your Files Here !/045 - Chapter 5 Protecting sensitive attributes.mp4
61.55MB
~Get Your Files Here !/046 - Chapter 6 Self-contained tokens and JWTs.mp4
37.11MB
~Get Your Files Here !/047 - Chapter 6 JSON Web Tokens.mp4
64.47MB
~Get Your Files Here !/048 - Chapter 6 The JOSE header.mp4
39.77MB
~Get Your Files Here !/049 - Chapter 6 Generating standard JWTs.mp4
48.85MB
~Get Your Files Here !/050 - Chapter 6 Encrypting sensitive attributes.mp4
59.19MB
~Get Your Files Here !/051 - Chapter 6 Authenticated encryption with NaCl.mp4
34.2MB
~Get Your Files Here !/052 - Chapter 6 Encrypted JWTs.mp4
56.98MB
~Get Your Files Here !/053 - Chapter 6 Using a JWT library.mp4
38.65MB
~Get Your Files Here !/054 - Chapter 6 Using types for secure API design.mp4
45.41MB
~Get Your Files Here !/055 - Chapter 6 Handling token revocation.mp4
87.36MB
~Get Your Files Here !/056 - Part 3. Authorization.mp4
9.99MB
~Get Your Files Here !/057 - Chapter 7 OAuth2 and OpenID Connect.mp4
68.49MB
~Get Your Files Here !/058 - Chapter 7 The difference between scopes and permissions.mp4
42.31MB
~Get Your Files Here !/059 - Chapter 7 Introducing OAuth2.mp4
73.82MB
~Get Your Files Here !/060 - Chapter 7 The Authorization Code grant.mp4
68.88MB
~Get Your Files Here !/061 - Chapter 7 Hardening code exchange with PKCE.mp4
41.46MB
~Get Your Files Here !/062 - Chapter 7 Validating an access token.mp4
65.3MB
~Get Your Files Here !/063 - Chapter 7 Securing the HTTPS client configuration.mp4
62.6MB
~Get Your Files Here !/064 - Chapter 7 JWT access tokens.mp4
74.41MB
~Get Your Files Here !/065 - Chapter 7 Encrypted JWT access tokens.mp4
33.4MB
~Get Your Files Here !/066 - Chapter 7 Single sign-on.mp4
47.52MB
~Get Your Files Here !/067 - Chapter 7 Hardening OIDC.mp4
66.71MB
~Get Your Files Here !/068 - Chapter 8 Identity-based access control.mp4
60.87MB
~Get Your Files Here !/069 - Chapter 8 LDAP groups.mp4
35.83MB
~Get Your Files Here !/070 - Chapter 8 Role-based access control.mp4
58.97MB
~Get Your Files Here !/071 - Chapter 8 Static roles.mp4
58.43MB
~Get Your Files Here !/072 - Chapter 8 Attribute-based access control.mp4
48.2MB
~Get Your Files Here !/073 - Chapter 8 Implementing ABAC decisions.mp4
52.72MB
~Get Your Files Here !/074 - Chapter 8 Distributed policy enforcement and XACML.mp4
80.46MB
~Get Your Files Here !/075 - Chapter 9 Capability-based security and macaroons.mp4
58.97MB
~Get Your Files Here !/076 - Chapter 9 Capabilities and REST.mp4
43.98MB
~Get Your Files Here !/077 - Chapter 9 Capabilities as URIs.mp4
59.47MB
~Get Your Files Here !/078 - Chapter 9 Using capability URIs in the Natter API.mp4
48.52MB
~Get Your Files Here !/079 - Chapter 9 HATEOAS.mp4
49.87MB
~Get Your Files Here !/080 - Chapter 9 Capability URIs for browser-based clients.mp4
62.69MB
~Get Your Files Here !/081 - Chapter 9 Hardening capability URIs.mp4
33.34MB
~Get Your Files Here !/082 - Chapter 9 Macaroons Tokens with caveats.mp4
41.54MB
~Get Your Files Here !/083 - Chapter 9 A macaroon token store.mp4
61.08MB
~Get Your Files Here !/084 - Chapter 9 Third-party caveats.mp4
57.84MB
~Get Your Files Here !/085 - Part 4. Microservice APIs in Kubernetes.mp4
7.68MB
~Get Your Files Here !/086 - Chapter 10 Microservice APIs in Kubernetes.mp4
75.46MB
~Get Your Files Here !/087 - Chapter 10 Deploying Natter on Kubernetes.mp4
28.23MB
~Get Your Files Here !/088 - Chapter 10 Building H2 database as a Docker container.mp4
78.08MB
~Get Your Files Here !/089 - Chapter 10 Deploying the database to Kubernetes.mp4
66.6MB
~Get Your Files Here !/090 - Chapter 10 Building the Natter API as a Docker container.mp4
47.53MB
~Get Your Files Here !/091 - Chapter 10 The link-preview microservice.mp4
62.5MB
~Get Your Files Here !/092 - Chapter 10 Preventing SSRF attacks.mp4
81.15MB
~Get Your Files Here !/093 - Chapter 10 DNS rebinding attacks.mp4
36.42MB
~Get Your Files Here !/094 - Chapter 10 Securing communications with TLS.mp4
52.71MB
~Get Your Files Here !/095 - Chapter 10 Using a service mesh for TLS.mp4
67.79MB
~Get Your Files Here !/096 - Chapter 10 Locking down network connections.mp4
62.05MB
~Get Your Files Here !/097 - Chapter 10 Securing incoming requests.mp4
70.25MB
~Get Your Files Here !/098 - Chapter 11 Securing service-to-service APIs.mp4
46.46MB
~Get Your Files Here !/099 - Chapter 11 The OAuth2 client credentials grant.mp4
64.1MB
~Get Your Files Here !/100 - Chapter 11 The JWT bearer grant for OAuth2.mp4
73MB
~Get Your Files Here !/101 - Chapter 11 Generating the JWT.mp4
48.65MB
~Get Your Files Here !/102 - Chapter 11 Mutual TLS authentication.mp4
72.01MB
~Get Your Files Here !/103 - Chapter 11 Verifying client identity.mp4
49.04MB
~Get Your Files Here !/104 - Chapter 11 Using a service mesh.mp4
68.5MB
~Get Your Files Here !/105 - Chapter 11 Certificate-bound access tokens.mp4
88.33MB
~Get Your Files Here !/106 - Chapter 11 Managing service credentials.mp4
75.77MB
~Get Your Files Here !/107 - Chapter 11 Key and secret management services.mp4
81.19MB
~Get Your Files Here !/108 - Chapter 11 Avoiding long-lived secrets on disk.mp4
36.59MB
~Get Your Files Here !/109 - Chapter 11 Key derivation.mp4
51.99MB
~Get Your Files Here !/110 - Chapter 11 Service API calls in response to user requests.mp4
64.16MB
~Get Your Files Here !/111 - Chapter 11 OAuth2 token exchange.mp4
70.75MB
~Get Your Files Here !/112 - Chapter 11.OAuth2 token exchange.mp4
38.72MB
~Get Your Files Here !/113 - Part 5. APIs for the Internet of Things.mp4
7.54MB
~Get Your Files Here !/114 - Chapter 12 Securing IoT communications.mp4
50MB
~Get Your Files Here !/115 - Chapter 12 Datagram TLS.mp4
47.35MB
~Get Your Files Here !/116 - Chapter 12 Datagram TLS.mp4
70.55MB
~Get Your Files Here !/117 - Chapter 12 Datagram TLS.mp4
43.95MB
~Get Your Files Here !/118 - Chapter 12 Cipher suites for constrained devices.mp4
49.24MB
~Get Your Files Here !/119 - Chapter 12 Cipher suites for constrained devices.mp4
50.72MB
~Get Your Files Here !/120 - Chapter 12 Cipher suites for constrained devices.mp4
37.66MB
~Get Your Files Here !/121 - Chapter 12 Pre-shared keys.mp4
56.5MB
~Get Your Files Here !/122 - Chapter 12 The PSK client.mp4
67.14MB
~Get Your Files Here !/123 - Chapter 12 End-to-end security.mp4
56.99MB
~Get Your Files Here !/124 - Chapter 12 COSE.mp4
56.3MB
~Get Your Files Here !/125 - Chapter 12 Alternatives to COSE.mp4
55.11MB
~Get Your Files Here !/126 - Chapter 12 Misuse-resistant authenticated encryption.mp4
46.49MB
~Get Your Files Here !/127 - Chapter 12 Misuse-resistant authenticated encryption.mp4
61.69MB
~Get Your Files Here !/128 - Chapter 12 Key distribution and management.mp4
69.47MB
~Get Your Files Here !/129 - Chapter 12 Ratcheting for forward secrecy.mp4
30.82MB
~Get Your Files Here !/130 - Chapter 12 Post-compromise security.mp4
86.76MB
~Get Your Files Here !/131 - Chapter 13 Securing IoT APIs.mp4
51.17MB
~Get Your Files Here !/132 - Chapter 13 Device certificates.mp4
52.6MB
~Get Your Files Here !/133 - Chapter 13 End-to-end authentication.mp4
78.46MB
~Get Your Files Here !/134 - Chapter 13 OSCORE.mp4
81.67MB
~Get Your Files Here !/135 - Chapter 13 Avoiding replay in REST APIs.mp4
76.12MB
~Get Your Files Here !/136 - Chapter 13 OAuth2 for constrained environments.mp4
45.32MB
~Get Your Files Here !/137 - Chapter 13 OAuth2 for constrained environments.mp4
51.82MB
~Get Your Files Here !/138 - Chapter 13 Offline access control.mp4
39.15MB
~Get Your Files Here !/139 - Chapter 13 Offline authorization.mp4
56.19MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统