zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Information Technology Security 2014
magnet:?xt=urn:btih:0C44EA64AF1E8BE1E6EAB5252CE583E6118E8FD0&dn=Information Technology Security 2014
磁力链接详情
Hash值:
0C44EA64AF1E8BE1E6EAB5252CE583E6118E8FD0
点击数:
218
文件大小:
3.99 GB
文件数量:
30
创建日期:
2016-2-3 08:38
最后访问:
2024-12-18 20:34
访问标签:
Information
Technology
Security
2014
文件列表详情
01-Introduction to IT Security (ITS335, L1, Y14).mp4 304.31 MB
03-Symmetric Key Encryption and Brute Forece (ITS335, L3, Y14).mp4 271.7 MB
23-iptables Firewall Examples (ITS335, L23, Y14).mp4 243.09 MB
08-Password Storage Approaches (ITS335, L8, Y14).mp4 219.43 MB
04-Authentication with Symmetric Key Ciphers (ITS335, L4, Y14).mp4 202.02 MB
05-Authentication with Hash Functions (ITS335, L05, Y14).mp4 196.59 MB
06-Public Key Crypto and Digital Signatures (ITS335, L6, Y14).mp4 185.12 MB
20-Web Browsing and HTTPS (ITS335, L20, Y14).mp4 172.76 MB
11-Malicious Software (ITS335, L11, Y14).mp4 171.99 MB
16-DDoS with Reflectors and Amplification (ITS335, L16, Y14).mp4 164.23 MB
07-User Authentication and Passwords (ITS335, L7, Y14).mp4 163.38 MB
24-Web Security Attacks (ITS335, L24, Y14).mp4 161.02 MB
21-Web Security and HTTPS (ITS335, L21, Y14).mp4 159.36 MB
18-Firewalls and Stateful Packet Insecption (ITS335, L18, Y14).mp4 156.36 MB
17-Firewalls (ITS335, L17, Y14).mp4 145.43 MB
28-Web Proxies, VPNs and Tor (ITS335, L28, Y14).mp4 141.18 MB
19-Firewall Examples and Proxies (ITS335, L19, Y14).mp4 140.18 MB
02-Encryption Techniques (ITS335, L2, Y14).mp4 125.66 MB
22-Digital Certificates (ITS335, L22, Y14).mp4 119.17 MB
09-Salts, Passwords and Rainbow Table Attacks (ITS335, L9, Y14).mp4 109.92 MB
10-Access Control (ITS335, L10, Y14).mp4 95.67 MB
11-Linux Permissions Examples (ITS335, L11, Y14).mp4 92.34 MB
27-Internet Privacy Options (ITS335, L27, Y14).mp4 85.18 MB
25-SQL Injection Attack (ITS335, L25, Y14).mp4 66.23 MB
11-Role-Based and Mandatory Access Control (ITS335, L11, Y14).mp4 63.61 MB
09-Overview of Token and Biometric Authentication (ITS335, L9, Y14).mp4 50.5 MB
19-iptables Example in a Virtual Network (ITS335, L19, Y14).mp4 30.14 MB
25-Unvalidated Redirect Attack (ITS335, L25, Y14).mp4 24.59 MB
25-Cross Site Request Forgery Attack (ITS335, L25, Y14).mp4 20.08 MB
25-Firefox with SOCKS Proxy to VirtualBox Node (ITS335, L25, Y14).mp4 6.01 MB
其他位置