搜索
为您找到约
226
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
Securing Generative AI
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4
71.1 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4
69.3 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4
62.2 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4
54.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4
51.4 MB
Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4
51.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4
43.6 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4
40.1 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4
38.0 MB
Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4
35.6 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4
30.6 MB
Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4
27.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4
24.5 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4
22.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4
22.2 MB
Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4
21.9 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4
21.0 MB
Introduction/001. Securing Generative AI Introduction.mp4
19.7 MB
Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4
19.0 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4
18.0 MB
[磁力链接]
添加时间:
2024-10-23
大小:
886.8 MB
最近下载:
2024-11-30
热度:
180
Chaney R. Securing Enterprise Networks with Cisco Meraki 2025
Chaney R. Securing Enterprise Networks with Cisco Meraki 2025.pdf
120.6 MB
[磁力链接]
添加时间:
2024-10-14
大小:
120.6 MB
最近下载:
2024-12-01
热度:
311
Securing Azure SQL Managed Instance
03. Encryption and Data Privacy Measures/02. Data Privacy with Dynamic Data Masking and Row-level Security.mp4
23.4 MB
02. Advanced Security Features in Azure SQL Managed Instance/01. Auditing and Advanced Threat Protection.mp4
20.9 MB
01. Deployment and Connectivity Options under Security Isolation/02. Deployment Options for Secure Architecture.mp4
18.2 MB
03. Encryption and Data Privacy Measures/01. Implementing Encryption Policies.mp4
15.5 MB
02. Advanced Security Features in Azure SQL Managed Instance/02. Authentication and Authorization with Microsoft Entra.mp4
13.8 MB
01. Deployment and Connectivity Options under Security Isolation/03. Secure Connectivity Options.mp4
10.6 MB
01. Deployment and Connectivity Options under Security Isolation/01. Securing Azure SQL Managed Instance.mp4
10.0 MB
04. Best Practices and Special Considerations/01. Best Practices for Securing Azure SQL Managed Instance.mp4
6.0 MB
04. Best Practices and Special Considerations/02. Migrating and Restoring Encrypted Databases.mp4
5.1 MB
azure-sql-managed-instance-
securing
.zip
4.1 MB
[磁力链接]
添加时间:
2024-10-12
大小:
127.7 MB
最近下载:
2024-11-30
热度:
317
[ CourseWikia.com ] PluralSight - Securing Azure Functions Solutions
~Get Your Files Here !/02/azure-functions-security-basics-slides.pdf
20.1 MB
~Get Your Files Here !/03/secure-http-endpoints-of-azure-functions-slides.pdf
12.4 MB
~Get Your Files Here !/3. Secure HTTP Endpoints of Azure Functions/3. Secure HTTP Azure Functions in Production.mp4
9.2 MB
~Get Your Files Here !/2. Azure Functions Security Basics/3. Additional Security Considerations.mp4
8.8 MB
~Get Your Files Here !/2. Azure Functions Security Basics/4. Demo - Managed Identities and Secure Connections with Azure Functions.mp4
8.0 MB
~Get Your Files Here !/3. Secure HTTP Endpoints of Azure Functions/4. Demo - Practical Usage of Access Keys with HTTP Azure Functions.mp4
6.9 MB
~Get Your Files Here !/2. Azure Functions Security Basics/2. Securing Azure Functions.mp4
6.6 MB
~Get Your Files Here !/2. Azure Functions Security Basics/1. Introduction.mp4
5.3 MB
~Get Your Files Here !/3. Secure HTTP Endpoints of Azure Functions/2. Guard Access to HTTP Azure Functions.mp4
5.1 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
2.5 MB
~Get Your Files Here !/3. Secure HTTP Endpoints of Azure Functions/5. Summary.mp4
2.0 MB
~Get Your Files Here !/3. Secure HTTP Endpoints of Azure Functions/1. Introduction.mp4
1.1 MB
~Get Your Files Here !/3. Secure HTTP Endpoints of Azure Functions/3. Secure HTTP Azure Functions in Production.vtt
5.9 kB
~Get Your Files Here !/2. Azure Functions Security Basics/3. Additional Security Considerations.vtt
5.4 kB
~Get Your Files Here !/2. Azure Functions Security Basics/2. Securing Azure Functions.vtt
4.0 kB
~Get Your Files Here !/2. Azure Functions Security Basics/4. Demo - Managed Identities and Secure Connections with Azure Functions.vtt
3.9 kB
~Get Your Files Here !/3. Secure HTTP Endpoints of Azure Functions/2. Guard Access to HTTP Azure Functions.vtt
3.1 kB
~Get Your Files Here !/2. Azure Functions Security Basics/1. Introduction.vtt
2.9 kB
~Get Your Files Here !/3. Secure HTTP Endpoints of Azure Functions/4. Demo - Practical Usage of Access Keys with HTTP Azure Functions.vtt
2.9 kB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
1.4 kB
[磁力链接]
添加时间:
2024-10-04
大小:
88.0 MB
最近下载:
2024-11-22
热度:
177
Brazzers - DoctorAdventures - Kortney Kane & Madison Ivy (Securing the Will) -={SPARROW}=-
Brazzers - DoctorAdventures - Kortney Kane & Madison Ivy (Securing the Will) -={SPARROW}=-.mp4
299.7 MB
Torrent Uploaded By ShowStopper132203 aka SS132203.png
215.1 kB
-={ SPARROW }=-.jpg
110.7 kB
Torrent Downloaded From ExtraTorrent.cc.txt
3.4 kB
[磁力链接]
添加时间:
2024-09-28
大小:
300.1 MB
最近下载:
2024-11-29
热度:
30
[ FreeCourseWeb.com ] PluralSight - Deploying, Administering, and Securing Palo Alto Firewalls.zip
[ FreeCourseWeb.com ] PluralSight - Deploying, Administering, and Securing Palo Alto Firewalls.zip
370.9 MB
[磁力链接]
添加时间:
2024-09-27
大小:
370.9 MB
最近下载:
2024-11-29
热度:
76
Securing Azure Functions Solutions
azure-functions-solutions-
securing
.zip
27.9 MB
03. Secure HTTP Endpoints of Azure Functions/03. Secure HTTP Azure Functions in Production.mp4
9.2 MB
02. Azure Functions Security Basics/03. Additional Security Considerations.mp4
8.8 MB
02. Azure Functions Security Basics/04. Demo- Managed Identities and Secure Connections with Azure Functions.mp4
8.0 MB
03. Secure HTTP Endpoints of Azure Functions/04. Demo- Practical Usage of Access Keys with HTTP Azure Functions.mp4
6.9 MB
02. Azure Functions Security Basics/02. Securing Azure Functions.mp4
6.6 MB
02. Azure Functions Security Basics/01. Introduction.mp4
5.3 MB
03. Secure HTTP Endpoints of Azure Functions/02. Guard Access to HTTP Azure Functions.mp4
5.1 MB
01. Course Overview/01. Course Overview.mp4
2.5 MB
03. Secure HTTP Endpoints of Azure Functions/05. Summary.mp4
2.0 MB
03. Secure HTTP Endpoints of Azure Functions/01. Introduction.mp4
1.1 MB
[磁力链接]
添加时间:
2024-09-01
大小:
83.3 MB
最近下载:
2024-11-30
热度:
555
Securing Your Network from Attacks [CoursesGhar]
00008 Social_Engineering.mp4
142.2 MB
00028 Identifying_Phishing_Emails.mp4
106.6 MB
00009 Physical_Attacks.mp4
92.7 MB
00004 DOS_DDOS_Attacks.mp4
91.5 MB
00038 Damage_Control_and_Assessment.mp4
89.1 MB
00040 Developing_and_Learning_from_Your_Attack.mp4
86.7 MB
00039 Backup_and_Recovery.mp4
78.6 MB
00026 IP_What_is_IP_Addresses_Why_They_are_Important.mp4
76.9 MB
00029 Running_a_Phishing_Campaign.mp4
73.8 MB
00015 Employee_Reporting.mp4
72.9 MB
00005 A_Malicious_Hacker_s_Methodology.mp4
63.4 MB
00025 Network_Alert_Software_and_Monitoring_Meraki.mp4
63.4 MB
00003 Typical_Attacks_Against_a_Network.mp4
62.8 MB
00017 Antivirus_and_Console_Tools.mp4
61.0 MB
00012 What_is_an_Insider_Threat.mp4
60.5 MB
00018 Fake_Error_Messages_a_Look_at_Scareware_and_What_it_is.mp4
59.9 MB
00027 About_Phishing_Emails.mp4
59.4 MB
00037 Bitcoin_Tracking.mp4
58.9 MB
00023 Monitoring_Software.mp4
57.4 MB
00010 Getting_Sneaky_with_MiTM_and_DDOS_Attacks.mp4
54.7 MB
[磁力链接]
添加时间:
2024-08-30
大小:
2.4 GB
最近下载:
2024-09-02
热度:
13
B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4
B2B.Ivy.Ireland.Securing.A.Deal.BBC.r.nhttps.buzzheavier.com.f.GPNa8J.wIAA.720p.mp4
1.1 GB
[磁力链接]
添加时间:
2024-08-04
大小:
1.1 GB
最近下载:
2024-11-01
热度:
6
[ CourseHulu.com ] Learn Computer Forensics - Your one-stop guide to searching, analyzing, acquiring, and
securing
digital evidence, 2nd Edition
~Get Your Files Here !/9781803238302-LEARNCOMPUTERFORENSICS.pdf
51.1 MB
~Get Your Files Here !/9781803238302.epub
39.1 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
180 Bytes
[磁力链接]
添加时间:
2024-07-11
大小:
90.2 MB
最近下载:
2024-11-30
热度:
1121
SheLovesBlack.24.04.11.Ivy.Ireland.Securing.A.Deal.XXX.720p.MP4-P2P[XC]
shelovesblack.24.04.11.ivy.ireland.
securing
.a.deal.xxx.mp4
1.1 GB
Torrent Downloaded From XXXClub.to .nfo
34 Bytes
[磁力链接]
添加时间:
2024-06-10
大小:
1.1 GB
最近下载:
2024-11-30
热度:
1959
New.Ivy.Ireland.Securing.A.Deal.2024.Hardcore.Roleplay.Black.ILUVY.mp4
New.Ivy.Ireland.Securing.A.Deal.2024.Hardcore.Roleplay.Black.ILUVY.mp4
559.2 MB
[磁力链接]
添加时间:
2024-06-06
大小:
559.2 MB
最近下载:
2024-12-01
热度:
397
Securing Your GitHub Project
03. Securing Your Development Workflow/04. Protecting GitHub Actions Secrets.mp4
21.7 MB
04. Discovering Vulnerabilities in Dependencies and Code/04. Discovering Vulnerabilities Using Static Analysis.mp4
18.6 MB
02. Safeguarding Access to Your GitHub Repository/02. Open Sourcing a JavaScript Library.mp4
17.4 MB
04. Discovering Vulnerabilities in Dependencies and Code/03. Patching Vulnerable Dependencies.mp4
17.0 MB
03. Securing Your Development Workflow/01. Hardening the GitHub Flow.mp4
14.4 MB
05. Publishing Security Fixes/02. Fixing the Code.mp4
12.9 MB
02. Safeguarding Access to Your GitHub Repository/07. Configuring Commit Signing Keys.mp4
11.8 MB
04. Discovering Vulnerabilities in Dependencies and Code/02. Managing Vulnerabilities in Dependencies.mp4
11.3 MB
03. Securing Your Development Workflow/02. Preventing Sensitive Data Leaks.mp4
11.3 MB
05. Publishing Security Fixes/03. Publishing the Fix.mp4
11.2 MB
05. Publishing Security Fixes/01. Vulnerabilities in Open Source Code.mp4
10.5 MB
04. Discovering Vulnerabilities in Dependencies and Code/01. Open Source Dependencies.mp4
9.5 MB
github-project-
securing
.zip
9.5 MB
02. Safeguarding Access to Your GitHub Repository/06. Configuring 2FA.mp4
8.5 MB
03. Securing Your Development Workflow/03. Recovering from Sensitive Data Leak.mp4
8.3 MB
02. Safeguarding Access to Your GitHub Repository/05. Protecting User Credentials.mp4
7.4 MB
02. Safeguarding Access to Your GitHub Repository/04. Using SSH Keys.mp4
6.8 MB
02. Safeguarding Access to Your GitHub Repository/03. Understanding Open Source Security.mp4
5.3 MB
01. Course Overview/01. Course Overview.mp4
3.1 MB
03. Securing Your Development Workflow/05. Summary.mp4
1.5 MB
[磁力链接]
添加时间:
2024-06-01
大小:
221.9 MB
最近下载:
2024-12-01
热度:
1103
SEC505 - Securing Windows and PowerShell Automation
USB 2020/SANS[SEC 505.505.20.2].iso
759.3 MB
VoD 2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/3.mp4
135.2 MB
VoD 2020/1. Learning PowerShell Scripting for Security/1. The ObjectOriented Command Shell/9.mp4
119.4 MB
VoD 2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/7.mp4
95.8 MB
VoD 2020/1. Learning PowerShell Scripting for Security/2. Objects Properties Methods and Arrays/4.mp4
81.1 MB
VoD 2020/5. Certificates and Multifactor Authentication/2. Private Key Security Best Practices/3.mp4
58.5 MB
PDF 2020/SEC505_F01_03_19580_001.pdf
53.1 MB
VoD 2020/2. You Dont Know THE POWER/4. Group Policy for Script Execution/11.mp4
52.3 MB
VoD 2020/4. Hardening Network Services with PowerShell/2. Scripting IPsec for RoleBased Access Control/6.mp4
51.6 MB
VoD 2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/5.mp4
50.0 MB
VoD 2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/3.mp4
49.7 MB
VoD 2020/2. You Dont Know THE POWER/3. OpenSSH for Windows/11.mp4
49.5 MB
VoD 2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/32.mp4
46.5 MB
VoD 2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/2.mp4
45.1 MB
VoD 2020/5. Certificates and Multifactor Authentication/1. Installing Certificate Services with PowerShell/10.mp4
42.4 MB
VoD 2020/6. PowerShell Security Ransomware and DevOps/2. PowerShell Security Best Practices/20.mp4
41.7 MB
VoD 2020/2. You Dont Know THE POWER/2. PowerShell Just Enough Admin JEA/16.mp4
41.1 MB
VoD 2020/5. Certificates and Multifactor Authentication/3. Managing and Using Your PKI for PowerShell/13.mp4
40.3 MB
VoD 2020/1. Learning PowerShell Scripting for Security/3. Flow Control Conditional Testing and Loops/4.mp4
39.5 MB
VoD 2020/4. Hardening Network Services with PowerShell/1. Scripting Windows Firewall Rules/10.mp4
39.2 MB
[磁力链接]
添加时间:
2024-05-08
大小:
5.6 GB
最近下载:
2024-11-30
热度:
1966
SEC522 - Application Security: Securing Web Applications, APIs, and Microservices
USB 2020/522.20.2.7z
7.2 GB
VoD 2020/1. Web Fundamentals and Security Configurations/5. Architecture and DefenseinDepth/21. Exercise 13.mp4
140.5 MB
VoD 2020/3. Web Application Authentication and Authorization/6. Encryption/7. The Web of Trust Establishing Trust.mp4
115.3 MB
VoD 2020/1. Web Fundamentals and Security Configurations/3. HTTP Basics/24. Exercise 11.mp4
100.7 MB
VoD 2020/1. Web Fundamentals and Security Configurations/7. Managing Configurations for Web Apps/30. Exercise 14.mp4
85.3 MB
VoD 2020/2. Defense against InputRelated Threats/9. File Upload/7. Exercise 24.mp4
78.2 MB
VoD 2020/5. CuttingEdge Web Security/9. Logging and Error Handling/20. What to Log Authentication and Access Control.mp4
68.0 MB
VoD 2020/5. CuttingEdge Web Security/9. Logging and Error Handling/24. Exercise 55.mp4
66.4 MB
VoD 2020/3. Web Application Authentication and Authorization/2. Multifactor Authentication/16. Exercise 31.mp4
62.6 MB
VoD 2020/3. Web Application Authentication and Authorization/5. Single SignOn Session Sharing/28. Exercise 33.mp4
60.6 MB
VoD 2020/3. Web Application Authentication and Authorization/8. Tokenization/6. Exercise 34.mp4
54.0 MB
VoD 2020/2. Defense against InputRelated Threats/6. CrossSite Scripting/30. Exercise 23.mp4
50.9 MB
VoD 2020/1. Web Fundamentals and Security Configurations/4. Web Foundations Overview/30. Exercise 12.mp4
45.9 MB
VoD 2020/2. Defense against InputRelated Threats/3. SQL Injection/21. Exercise 21.mp4
45.5 MB
VoD 2020/3. Web Application Authentication and Authorization/5. Single SignOn Session Sharing/19. OAuth 2 Web Server Workflow.mp4
41.2 MB
VoD 2020/2. Defense against InputRelated Threats/4. CrossSite Request Forgery CSRF/24. Exercise 22.mp4
38.7 MB
VoD 2020/3. Web Application Authentication and Authorization/3. Session Fixation/10. Exercise 32.mp4
38.5 MB
VoD 2020/3. Web Application Authentication and Authorization/2. Multifactor Authentication/10. OTP Token Enrollment.mp4
32.7 MB
VoD 2020/4. Web Services And Front End Security/5. CrossDomain AJAX/26. Exercise 43.mp4
32.2 MB
VoD 2020/3. Web Application Authentication and Authorization/2. Multifactor Authentication/14. WebAuthn Credential Options Example.mp4
32.1 MB
[磁力链接]
添加时间:
2024-04-30
大小:
10.6 GB
最近下载:
2024-12-01
热度:
2387
Securing a Kafka Cluster
06. Authorizing Clients/06. Demo- Authorizing Kafka Connect.mp4
37.8 MB
05. Authenticating Clients/04. Demo- SASL PLAIN.mp4
37.4 MB
05. Authenticating Clients/09. Demo- SASL GSSAPI.mp4
37.3 MB
04. Encrypting Communication with Kafka/02. Demo- Kafka Clients TLS.mp4
35.9 MB
05. Authenticating Clients/05. SASL SCRAM.mp4
32.8 MB
05. Authenticating Clients/01. mTLS.mp4
31.7 MB
03. Encrypting Communication with Zookeeper/02. Demo- Zookeeper Quorum TLS.mp4
30.6 MB
04. Encrypting Communication with Kafka/05. Demo- End-to-end Encryption.mp4
29.8 MB
06. Authorizing Clients/04. Demo- Authorizing Producer and Consumer.mp4
25.9 MB
06. Authorizing Clients/05. Demo- Authorizing Kafka Streams.mp4
25.5 MB
06. Authorizing Clients/03. Demo- Setting up Authorization.mp4
25.3 MB
05. Authenticating Clients/06. SASL OAUTHBEARER.mp4
20.4 MB
03. Encrypting Communication with Zookeeper/03. Demo- Zookeeper Brokers TLS.mp4
18.5 MB
02. Handling Cryptography Containers/04. Demo- Creating Keystores and Truststores.mp4
13.7 MB
04. Encrypting Communication with Kafka/03. Demo- Inter Broker TLS.mp4
11.9 MB
securing
-kafka-cluster.zip
10.0 MB
02. Handling Cryptography Containers/03. Public Key Infrastructure.mp4
9.9 MB
05. Authenticating Clients/08. Demo- Creating Kerberos Keytabs.mp4
9.6 MB
04. Encrypting Communication with Kafka/04. End-to-end Encryption.mp4
8.5 MB
05. Authenticating Clients/07. SASL GSSAPI and Delegation Token.mp4
8.4 MB
[磁力链接]
添加时间:
2024-04-23
大小:
513.7 MB
最近下载:
2024-11-30
热度:
1978
[ FreeCourseWeb.com ] PluralSight - Securing AWS Networks.zip
[ FreeCourseWeb.com ] PluralSight - Securing AWS Networks.zip
191.2 MB
[磁力链接]
添加时间:
2024-04-10
大小:
191.2 MB
最近下载:
2024-11-01
热度:
11
[ CourseWikia.com ] Linkedin - Securing the Use of Generative AI in Your Organization
~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/02 - Public AI Risk Mitigation.mp4
31.4 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/05 - Hallucinations.mp4
23.8 MB
~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/02 - Governance of Generative AI.mp4
17.9 MB
~Get Your Files Here !/01 - Introduction/02 - Security Challenges in Generative AI.mp4
16.9 MB
~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/01 - NIST AI Risk management Framework.mp4
14.5 MB
~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/03 - Writing your Generative AI Policy.mp4
13.6 MB
~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/03 - Introducing the MITIGATE AI Cyber framework.mp4
12.1 MB
~Get Your Files Here !/03 - 2. Understanding and Mitigating Threats and Risks to Open Public Gen AI/01 - Top threats presented by Public AI.mp4
10.0 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/01 - Data Poisoning and Prompt Injection Attacks.mp4
9.5 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/03 - Model poisoning and manipulation.mp4
8.7 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/06 - Inadequate sandboxing and malcious code execution.mp4
8.3 MB
~Get Your Files Here !/05 - 4. Bonus AI Security Strategies and Frameworks/02 - AI browser plugin risk management.mp4
7.7 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/02 - Model Inversion and Data Leakage.mp4
7.4 MB
~Get Your Files Here !/04 - 3. Govenance and Ethics of genrative AI/01 - Ethical and Bias Considerations in Generative AI.mp4
6.6 MB
~Get Your Files Here !/06 - Conclusion/01 - Gen AI Fortified Your roadmap ahead.mp4
6.0 MB
~Get Your Files Here !/02 - 1. Understanding and Mitigating Threat and Risks to Home Grown Private Gen AI/04 - Model and Stealing.mp4
6.0 MB
~Get Your Files Here !/01 - Introduction/01 - Introduction to Generative AI.mp4
4.8 MB
~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Apply the TRUSTED Framework.pdf
40.1 kB
~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/Write your Gen AI policy.pdf
37.8 kB
~Get Your Files Here !/Ex_Files_Securing_Use_Gen_AI/Exercise Files/PDF files/AI Browser Plugin and Extension Strategy and Plan.pdf
33.3 kB
[磁力链接]
添加时间:
2024-03-06
大小:
205.2 MB
最近下载:
2024-11-26
热度:
361
[ FreeCourseWeb.com ] Udemy - IT Security 101 - Protecting and Securing Computer Networks.zip
[ FreeCourseWeb.com ] Udemy - IT Security 101 - Protecting and Securing Computer Networks.zip
414.2 MB
[磁力链接]
添加时间:
2024-03-01
大小:
414.2 MB
最近下载:
2024-11-30
热度:
379
[ FreeCourseWeb.com ] PluralSight - Securing Microservices in ASP.NET Core
~Get Your Files Here !/2. Securing Your First Microservice/12. Demo - Using the Identity Microservice to Log In.mp4
61.5 MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/6. Demo - Making the Gateway Responsible for Exchanging Tokens.mp4
55.9 MB
~Get Your Files Here !/7. Securing Async Service Communication/5. Demo - Sending and Validating a Token.mp4
54.5 MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/4. Demo - Configuring the Gateway for Scope-based Microservice Access Authorization.mp4
52.7 MB
~Get Your Files Here !/2. Securing Your First Microservice/10. Demo - Accessing a Microservice on Behalf of the Client Application.mp4
41.9 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/10. Demo - Service to Service Communication on Behal.mp4
37.2 MB
~Get Your Files Here !/2. Securing Your First Microservice/15. Demo - Accessing a Microservice on Behalf of the User.mp4
35.5 MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/6. Demo - Integrating Ocelot with Our Identity Service.mp4
31.8 MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/5. Demo - Adding Token Store Support for Custom Flows.mp4
30.6 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/9. Demo - Adding Support for the Token Exchange Gran.mp4
28.9 MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/5. Demo - Adding Ocelot.mp4
28.5 MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/8. Demo - Passing User Information to a Microservice.mp4
28.3 MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/3. Demo - Making Microservices Responsible for Validating Incoming Tokens.mp4
26.9 MB
~Get Your Files Here !/7. Securing Async Service Communication/4. Demo - Requesting a Token.mp4
25.7 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/6. Demo - Authorization with Scopes Inside of a Micr.mp4
24.6 MB
~Get Your Files Here !/2. Securing Your First Microservice/7. Demo - Inspecting an Identity Service.mp4
23.8 MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/3. Demo - Tightening Access with One Audience per Mi.mp4
23.3 MB
~Get Your Files Here !/2. Securing Your First Microservice/9. Demo - Blocking Access to a Microservice.mp4
23.1 MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/3. Demo - Refreshing Tokens with IdentityModel.AspNetCore.mp4
22.3 MB
~Get Your Files Here !/7. Securing Async Service Communication/7. Demo - Dealing with Token Expiration.mp4
21.5 MB
[磁力链接]
添加时间:
2024-02-26
大小:
1.0 GB
最近下载:
2024-11-29
热度:
818
共12页
上一页
1
2
3
4
5
下一页