搜索
为您找到约
226
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
Madison Ivy, Kortney Kane - Securing Will.mp4
Madison Ivy, Kortney Kane - Securing Will.mp4
948.5 MB
[磁力链接]
添加时间:
2021-03-10
大小:
948.5 MB
最近下载:
2024-11-29
热度:
673
Windows 8 Hacking & Securing
Torrent downloaded from demonoid.pw.txt
46 Bytes
Torrent Downloaded From ExtraTorrent.cc.txt
352 Bytes
Windows 8 Hacking & Securing.tgz
913.3 MB
[磁力链接]
添加时间:
2017-03-01
大小:
913.3 MB
最近下载:
2024-06-13
热度:
401
Securing Microservices in ASP.NET Core By Kevin Dockx
exercise.zip
66.2 MB
2. Securing Your First Microservice/12. Demo - Using the Identity Microservice to Log In.mp4
61.5 MB
5. Improving the API Gateway Pattern/6. Demo - Making the Gateway Responsible for Exchanging Tokens.mp4
55.9 MB
7. Securing Async Service Communication/5. Demo - Sending and Validating a Token.mp4
54.5 MB
5. Improving the API Gateway Pattern/4. Demo - Configuring the Gateway for Scope-based Microservice Access Authorization.mp4
52.7 MB
2. Securing Your First Microservice/10. Demo - Accessing a Microservice on Behalf of the Client Application.mp4
41.9 MB
3. Improving Your Security with Service to Service and Token Exchange Patterns/10. Demo - Service to Service Communication on Behal.mp4
37.2 MB
2. Securing Your First Microservice/15. Demo - Accessing a Microservice on Behalf of the User.mp4
35.5 MB
4. Implementing Security with API Gateway and BFF Patterns/6. Demo - Integrating Ocelot with Our Identity Service.mp4
31.8 MB
6. Enabling Long-lived Access and Token Stores/5. Demo - Adding Token Store Support for Custom Flows.mp4
30.6 MB
3. Improving Your Security with Service to Service and Token Exchange Patterns/9. Demo - Adding Support for the Token Exchange Gran.mp4
28.9 MB
4. Implementing Security with API Gateway and BFF Patterns/5. Demo - Adding Ocelot.mp4
28.5 MB
4. Implementing Security with API Gateway and BFF Patterns/8. Demo - Passing User Information to a Microservice.mp4
28.3 MB
5. Improving the API Gateway Pattern/3. Demo - Making Microservices Responsible for Validating Incoming Tokens.mp4
26.9 MB
7. Securing Async Service Communication/4. Demo - Requesting a Token.mp4
25.7 MB
3. Improving Your Security with Service to Service and Token Exchange Patterns/6. Demo - Authorization with Scopes Inside of a Micr.mp4
24.6 MB
2. Securing Your First Microservice/7. Demo - Inspecting an Identity Service.mp4
23.8 MB
3. Improving Your Security with Service to Service and Token Exchange Patterns/3. Demo - Tightening Access with One Audience per Mi.mp4
23.3 MB
2. Securing Your First Microservice/9. Demo - Blocking Access to a Microservice.mp4
23.1 MB
6. Enabling Long-lived Access and Token Stores/3. Demo - Refreshing Tokens with IdentityModel.AspNetCore.mp4
22.3 MB
[磁力链接]
添加时间:
2021-05-07
大小:
908.6 MB
最近下载:
2024-12-01
热度:
4322
Securing Generative AI
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4
71.1 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4
69.3 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4
62.2 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4
54.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4
51.4 MB
Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4
51.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4
43.6 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4
40.1 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4
38.0 MB
Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4
35.6 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4
30.6 MB
Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4
27.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4
24.5 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4
22.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4
22.2 MB
Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4
21.9 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4
21.0 MB
Introduction/001. Securing Generative AI Introduction.mp4
19.7 MB
Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4
19.0 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4
18.0 MB
[磁力链接]
添加时间:
2024-10-23
大小:
886.8 MB
最近下载:
2024-11-30
热度:
180
Securing ASP.NET Core 3 with OAuth2 and OpenID Connect
3. Securing Your User Authentication Processes/3. Demo - Logging In with the Authorization Code Flow.mp4
64.9 MB
6. Securing Your API/3. Demo - Passing an Access Token to Your API.mp4
39.2 MB
9. Getting Ready for Production/5. Demo - Persisting Configuration Data.mp4
38.1 MB
8. Dealing with Token Expiration and Reference Tokens/5. Demo - Gaining Long-lived Access.mp4
35.5 MB
7. Authorization Policies and Access Control/5. Demo - Creating Custom Requirements and Handlers.mp4
32.8 MB
6. Securing Your API/2. Demo - Securing Access to Your API.mp4
31.2 MB
4. Working with Claims in Your Web Application/5. Demo - Manually Calling the UserInfo Endpoint to Get More Claims.mp4
30.7 MB
2. Implementing Authentication with OpenID Connect/6. Demo - Setting up IdentityServer4.mp4
26.3 MB
4. Working with Claims in Your Web Application/2. Demo - Claims Transformation- Manipulating the Claims Collection.mp4
25.0 MB
6. Securing Your API/8. Demo - Protecting the API When Creating a Resource (with Roles).mp4
23.4 MB
4. Working with Claims in Your Web Application/4. Demo - Getting Ready for Calling the UserInfo Endpoint.mp4
23.2 MB
4. Working with Claims in Your Web Application/7. Demo - Role-based Authorization- Ensuring the Role Is Included.mp4
22.3 MB
6. Securing Your API/5. Demo - Using Access Token Claims when Getting a Resource Collection.mp4
21.2 MB
7. Authorization Policies and Access Control/2. Demo - Creating a Simple Authorization Policy.mp4
17.9 MB
3. Securing Your User Authentication Processes/9. Demo - Redirecting After Logging Out.mp4
16.8 MB
3. Securing Your User Authentication Processes/7. Demo - Logging Out of Our Web Application.mp4
16.1 MB
3. Securing Your User Authentication Processes/1. The Authorization Code Flow.mp4
15.9 MB
7. Authorization Policies and Access Control/3. Demo - Using an Authorization Policy.mp4
15.1 MB
4. Working with Claims in Your Web Application/1. Demo - Claims Transformation- Keeping the Original Claim Types.mp4
14.6 MB
8. Dealing with Token Expiration and Reference Tokens/4. Demo - Supporting Refresh Tokens.mp4
13.7 MB
[磁力链接]
添加时间:
2021-04-05
大小:
882.6 MB
最近下载:
2024-06-16
热度:
185
WWE.Ruthless.Aggression.S02E05.Securing.the.Future.720p.WEB.H264-DARKSPORT[rarbg]
WWE.Ruthless.Aggression.S02E05.Securing.the.Future.720p.WEB.H264-DARKSPORT.mkv
840.5 MB
wwe.ruthless.aggression.s02e05.
securing
.the.future.720p.web.h264-darksport.nfo
9.1 kB
RARBG_DO_NOT_MIRROR.exe
99 Bytes
RARBG.txt
30 Bytes
[磁力链接]
添加时间:
2022-01-09
大小:
840.5 MB
最近下载:
2024-11-30
热度:
433
Cassidy Klein - Primal Fetish - Securing Project Funding (2017).mp4
Cassidy Klein - Primal Fetish - Securing Project Funding (2017).mp4
825.6 MB
[磁力链接]
添加时间:
2017-04-03
大小:
825.6 MB
最近下载:
2024-11-22
热度:
4092
Infinite Skills - Securing Cloud Services
01. Introduction To Cloud Services/0101 Introduction And About The Author.MP4
8.3 MB
01. Introduction To Cloud Services/0102 Service Models.MP4
19.0 MB
01. Introduction To Cloud Services/0103 Service And Deployment Models.MP4
12.5 MB
01. Introduction To Cloud Services/0104 Deployment Models Summary.MP4
11.0 MB
01. Introduction To Cloud Services/0105 Deployment Models And Benefits.MP4
23.7 MB
01. Introduction To Cloud Services/0106 Distributed Processing - The Reverse Cloud.MP4
17.6 MB
01. Introduction To Cloud Services/0107 Building Internal Cloud Hardware.MP4
15.3 MB
01. Introduction To Cloud Services/0108 Building Internal Cloud Software.MP4
9.8 MB
01. Introduction To Cloud Services/0109 Using An External Cloud.MP4
21.3 MB
02. Securing The Infrastructure/0201 Introduction.MP4
17.8 MB
02. Securing The Infrastructure/0202 Framework.MP4
20.7 MB
02. Securing The Infrastructure/0203 Policy Samples.MP4
25.3 MB
02. Securing The Infrastructure/0204 Risk Management Introduction.MP4
7.7 MB
02. Securing The Infrastructure/0205 Risk Assessment.MP4
13.4 MB
02. Securing The Infrastructure/0206 Risk Management.MP4
17.0 MB
02. Securing The Infrastructure/0207 Security Program And CIA.MP4
10.3 MB
02. Securing The Infrastructure/0208 CIA.MP4
26.1 MB
02. Securing The Infrastructure/0209 Types Of Security.MP4
18.8 MB
02. Securing The Infrastructure/0210 Sensitive Data.MP4
23.3 MB
02. Securing The Infrastructure/0211 Data Classification.MP4
13.3 MB
[磁力链接]
添加时间:
2017-04-05
大小:
821.6 MB
最近下载:
2024-11-28
热度:
701
[Brazzers] (Kortney Kane, Madison Ivy) Securing the Will XXX (2014) (1080p HEVC)
[Brazzers] (Kortney Kane, Madison Ivy) Securing the Will XXX (2014) (1080p HEVC).mp4
818.4 MB
[磁力链接]
添加时间:
2023-12-24
大小:
818.4 MB
最近下载:
2024-11-30
热度:
2532
hacking-
securing
-java-web-programming.zip
hacking-
securing
-java-web-programming.zip
813.8 MB
[磁力链接]
添加时间:
2017-02-23
大小:
813.8 MB
最近下载:
2024-08-06
热度:
165
[ FreeCourseWeb.com ] PluralSight - Dealing with Credentials When Securing an ASP.NET Core 3 Application.zip
[ FreeCourseWeb.com ] PluralSight - Dealing with Credentials When Securing an ASP.NET Core 3 Application.zip
813.7 MB
[磁力链接]
添加时间:
2022-02-05
大小:
813.7 MB
最近下载:
2024-11-30
热度:
844
[ FreeCourseWeb.com ] Securing NativeScript Applications.zip
[ FreeCourseWeb.com ] Securing NativeScript Applications.zip
811.3 MB
[磁力链接]
添加时间:
2021-04-11
大小:
811.3 MB
最近下载:
2024-11-21
热度:
278
[FreeCoursesOnline.Me] PacktPub - Securing Your AI and Machine Learning Systems [Video]
9781838826451_Code.zip
273.7 MB
3 - Build a Threat Model and Learn Different Attacks on AI/09 - Most Common AI Solutions and Threats.mp4
48.1 MB
1 - Machine Learning Security/01 - The Course Overview.mp4
42.9 MB
1 - Machine Learning Security/02 - Introduction to ML Security.mp4
31.4 MB
2 - Security Test Using Adversarial Attack/04 - Introduction to Machine Learning Tasks.mp4
27.3 MB
3 - Build a Threat Model and Learn Different Attacks on AI/14 - Practical Backdoor Attacks.mp4
17.9 MB
2 - Security Test Using Adversarial Attack/08 - Practical Example ..Adversarial Challenge.mp4
17.8 MB
7 - Summary and Future Trends/39 - Sources and Recommendations.mp4
17.3 MB
5 - Compare Various Attacks/21 - BIM Attack Practical Configuration.mp4
16.9 MB
5 - Compare Various Attacks/24 - PGD Attack Practical Configuration.mp4
15.9 MB
6 - Choosing the Right Defense/31 - Comparing Defence Approaches and Choosing the Best Defence.mp4
15.9 MB
3 - Build a Threat Model and Learn Different Attacks on AI/13 - Practical Privacy Attacks.mp4
15.9 MB
7 - Summary and Future Trends/37 - Choosing the Defenses.mp4
15.7 MB
1 - Machine Learning Security/03 - Setting Up the Environment.mp4
15.7 MB
7 - Summary and Future Trends/36 - Testing the Attacks.mp4
13.7 MB
3 - Build a Threat Model and Learn Different Attacks on AI/12 - Practical Poisoning Attacks.mp4
13.5 MB
5 - Compare Various Attacks/25 - Comparing Metrics and Choosing the Best Attack.mp4
12.4 MB
6 - Choosing the Right Defense/28 - Testing Practical Defense from Adversarial Training Category.mp4
12.4 MB
5 - Compare Various Attacks/22 - CW Attack Practical Configuration.mp4
11.0 MB
7 - Summary and Future Trends/34 - Preparing the Environment.mp4
10.4 MB
[磁力链接]
添加时间:
2021-03-20
大小:
809.8 MB
最近下载:
2024-11-22
热度:
832
Building and Securing a RESTful API for Multiple Clients in ASP.NET
01.Introduction/001.Introduction.mp4
6.0 MB
01.Introduction/002.Demo Case Introduction.mp4
1.5 MB
01.Introduction/003.Gathering Functional, Technical, and Environmental Requirements.mp4
14.7 MB
01.Introduction/004.Summary.mp4
1.6 MB
02.Building the API - REST and Web API Primer/005.Introduction to REST.mp4
6.4 MB
02.Building the API - REST and Web API Primer/006.REST Architectural Constraints.mp4
4.2 MB
02.Building the API - REST and Web API Primer/007.REST Architectural Constraints - Uniform Interface.mp4
5.9 MB
02.Building the API - REST and Web API Primer/008.REST Architectural Constraints - HATEOAS.mp4
2.7 MB
02.Building the API - REST and Web API Primer/009.The Case for Pragmatism.mp4
2.7 MB
02.Building the API - REST and Web API Primer/010.Introduction to ASP.NET Web API.mp4
1.2 MB
02.Building the API - REST and Web API Primer/011.Summary.mp4
2.3 MB
03.Building the API – Implementing Basic Requirements/012.Introduction and Designing Resource URIs.mp4
7.0 MB
03.Building the API – Implementing Basic Requirements/013.Interacting with Resources.mp4
6.1 MB
03.Building the API – Implementing Basic Requirements/014.HTTP Status Codes.mp4
3.7 MB
03.Building the API – Implementing Basic Requirements/015.Demo - Solution Overview and Getting a List of Resources with GET.mp4
22.9 MB
03.Building the API – Implementing Basic Requirements/016.Demo - Getting a Single Resource with GET.mp4
14.7 MB
03.Building the API – Implementing Basic Requirements/017.Demo - Formatters and Result Formatting.mp4
4.9 MB
03.Building the API – Implementing Basic Requirements/018.Demo - Creating a Resource with POST.mp4
9.4 MB
03.Building the API – Implementing Basic Requirements/019.Demo - Updating a Resource with PUT.mp4
7.4 MB
03.Building the API – Implementing Basic Requirements/020.A Few Words on PATCH.mp4
3.2 MB
[磁力链接]
添加时间:
2017-02-12
大小:
803.4 MB
最近下载:
2024-11-27
热度:
2057
Windows Server 2008 R2 Hacking and Securing
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/09 Rootkits and Stealth Apps_ Creating and Revealing v2.0 course/038 Writing a shellcode.mp4
188.7 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/10 BONUS section - get your coupon code here/039 Become CISS - Certified Ethical Hacking Training.mp4
84.4 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/07 Certificates/031 Certificates authority.mp4
30.2 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/03 Security policies/010 Windows security settings.mp4
29.2 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/04 Data and application security/018 Data encription.mp4
25.3 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/01 Introduction/003 System security policy - basics.mp4
25.0 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/04 Data and application security/022 AppLocker in practice.mp4
21.0 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/08 Testing configuration/035 CA website.mp4
20.8 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/03 Security policies/015 SCM_ Managing templates.mp4
20.6 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/08 Testing configuration/037 Now it's your turn. Thank you for taking part in our training.mp4
20.4 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/08 Testing configuration/034 How to check settings in real environment_.mp4
19.9 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/07 Certificates/032 Using CA.mp4
19.9 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/01 Introduction/002 Let's begin with some theory.mp4
19.5 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/03 Security policies/013 SCM_ Reviewing options.mp4
18.6 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/04 Data and application security/017 Theoretical basics about data and app security.mp4
17.4 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/08 Testing configuration/036 Attack Surface Analyzer.mp4
15.1 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/05 Monitoring security level/023 What you should know about monitoring the security.mp4
14.6 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/04 Data and application security/021 Executable rules.mp4
14.5 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/06 Group policy managment/028 Group Policies.mp4
14.2 MB
[TutsNode.com] - Windows Server 2008 R2 Hacking and Securing/06 Group policy managment/029 Linking the GPO.mp4
12.6 MB
[磁力链接]
添加时间:
2021-04-05
大小:
799.6 MB
最近下载:
2024-11-29
热度:
829
[ FreeCourseWeb.com ] Udemy - Hacking and Securing Docker Containers v2.0 (updated).zip
[ FreeCourseWeb.com ] Udemy - Hacking and Securing Docker Containers v2.0 (updated).zip
784.8 MB
[磁力链接]
添加时间:
2023-12-17
大小:
784.8 MB
最近下载:
2024-11-29
热度:
521
[ CoursePig.com ] Securing a Spring Boot REST API Using Spring Security with iPad Pro and Raspberry Pi 4
~Get Your Files Here !/04-Secure the API.mp4
163.3 MB
~Get Your Files Here !/06-Add Authentication Support to Services.mp4
158.0 MB
~Get Your Files Here !/07-Add Authentication Support to Controllers.mp4
157.1 MB
~Get Your Files Here !/03-Build JWT Support.mp4
137.0 MB
~Get Your Files Here !/05-Overview of Security Payload.mp4
50.9 MB
~Get Your Files Here !/08-Testing the API.mp4
43.7 MB
~Get Your Files Here !/02-Introduction.mp4
30.1 MB
~Get Your Files Here !/01-Summary.mp4
5.1 MB
~Get Your Files Here !/04-Secure the API.en.srt
14.4 kB
~Get Your Files Here !/03-Build JWT Support.en.srt
13.7 kB
~Get Your Files Here !/07-Add Authentication Support to Controllers.en.srt
12.5 kB
~Get Your Files Here !/06-Add Authentication Support to Services.en.srt
11.5 kB
~Get Your Files Here !/08-Testing the API.en.srt
7.6 kB
~Get Your Files Here !/02-Introduction.en.srt
6.9 kB
~Get Your Files Here !/05-Overview of Security Payload.en.srt
6.7 kB
~Get Your Files Here !/01-Summary.en.srt
1.2 kB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
179 Bytes
[磁力链接]
添加时间:
2022-02-04
大小:
745.3 MB
最近下载:
2024-11-30
热度:
1152
Cisco live CCSP Securing Networks with ASA.avi
Cisco live CCSP Securing Networks with ASA.avi
742.4 MB
[磁力链接]
添加时间:
2017-04-11
大小:
742.4 MB
最近下载:
2024-11-07
热度:
406
[ TutGator.com ] PluralSight - Securing REST Services Using Spring Security 5
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/1. Introduction.mp4
53.6 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.mp4
51.5 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.mp4
46.8 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.mp4
41.4 MB
~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.mp4
40.6 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.mp4
39.9 MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.mp4
36.4 MB
~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.mp4
35.5 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.mp4
24.1 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.mp4
22.1 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.mp4
19.7 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.mp4
17.1 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.mp4
16.9 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.mp4
15.1 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.mp4
13.5 MB
~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.mp4
13.4 MB
~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.mp4
12.8 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.mp4
12.0 MB
~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.mp4
11.7 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.mp4
11.1 MB
[磁力链接]
添加时间:
2023-12-18
大小:
735.3 MB
最近下载:
2024-11-29
热度:
1192
[PrimalFetish] Cassidy Klein - Securing Project Funding (26.03.2017) rq.mp4
[PrimalFetish] Cassidy Klein - Securing Project Funding (26.03.2017) rq.mp4
718.7 MB
[磁力链接]
添加时间:
2017-04-07
大小:
718.7 MB
最近下载:
2024-11-30
热度:
1625
共12页
上一页
1
2
3
4
5
6
7
下一页