lynda-com-Foundations-of-sllx
- 06 Encryption and User Authentication38 Brute-force attacks.mp411.28MB
- 04 Filtering Input, Controlling Output18 Sanitizing data.mp410.38MB
- 05 The Most Common Attacks26 SQL injection.mp49.28MB
- 06 Encryption and User Authentication43 Multi-factor authentication.mp49.26MB
- 04 Filtering Input, Controlling Output17 Validating input.mp49.25MB
- 05 The Most Common Attacks25 Cross-site request forgery (CSRF).mp49.05MB
- 05 The Most Common Attacks30 Session hijacking.mp48.56MB
- 06 Encryption and User Authentication42 Handling forgotten passwords.mp48.27MB
- 06 Encryption and User Authentication36 Salting passwords.mp48.13MB
- 05 The Most Common Attacks28 Faked requests and forms.mp47.99MB
- 05 The Most Common Attacks27 URL nipulation.mp47.83MB
- 04 Filtering Input, Controlling Output21 Keeping credentials private.mp47.78MB
- 04 Filtering Input, Controlling Output23 art logging.mp47.60MB
- 07 Other Areas of Concern44 Credit card payments.mp47.57MB
- 05 The Most Common Attacks34 Denial of service.mp47.54MB
- 07 Other Areas of Concern48 Source code nagers.mp47.35MB
- 02 Security Overview04 What is a hacker.mp47.25MB
- 06 Encryption and User Authentication39 Using SSL for login.mp47.12MB
- 05 The Most Common Attacks24 Cross-site scripting (XSS).mp47.08MB
- 07 Other Areas of Concern45 Regular expression flaws.mp47.02MB
- 07 Other Areas of Concern49 Database security.mp46.60MB
- 06 Encryption and User Authentication41 Regulating access privileges.mp46.12MB
- 03 General Security Principles08 Least privilege.mp46.07MB
- 07 Other Areas of Concern50 Server security.mp45.92MB
- 06 Encryption and User Authentication35 Password encryption.mp45.76MB
- 02 Security Overview03 Why security tters.mp45.72MB
- 04 Filtering Input, Controlling Output20 Keeping code private.mp45.58MB
- 05 The Most Common Attacks29 Cookie visibility and theft.mp45.25MB
- 01 Introductio Introduction.mp44.82MB
- 02 Security Overview06 Get in the security mind-set.mp44.76MB
- 05 The Most Common Attacks32 Remote system execution.mp44.72MB
- 02 Security Overview05 Total security is unachievable.mp44.71MB
- 02 Security Overview07 Write a security policy.mp44.64MB
- 05 The Most Common Attacks31 Session fixation.mp44.59MB
- 03 General Security Principles10 Never trust users.mp44.46MB
- 06 Encryption and User Authentication37 Password requirements.mp44.35MB
- 03 General Security Principles14 Blacklisting and whitelisting.mp44.13MB
- 03 General Security Principles15 p exposure points and data passageways.mp43.64MB
- 06 Encryption and User Authentication40 Protecting cookies.mp43.63MB
- 03 General Security Principles09 Simple is more secure.mp43.61MB
- 04 Filtering Input, Controlling Output16 Regulating requests.mp43.58MB
- 03 General Security Principles13 Security through obscurity.mp43.55MB
- 03 General Security Principles12 Defense in depth.mp43.55MB
- 04 Filtering Input, Controlling Output22 Keeping error messages vague.mp43.48MB
- 07 Other Areas of Concern47 Buffer overflows.mp43.40MB
- 02 Security Overview02 What is security.mp43.30MB
- 05 The Most Common Attacks33 File-upload abuse.mp43.23MB
- 03 General Security Principles11 Expect the unexpected.mp42.96MB
- 04 Filtering Input, Controlling Output19 Labeling variables.mp42.96MB
- 07 Other Areas of Concern46 Conversions and transfortions.mp42.90MB
- 08 Conclusion51 Goodbye.mp41.47MB
- CreateTime2018-03-01
- UpdateTime2018-03-06
- FileTotalCount51
- TotalSize299.57MBHotTimes6ViewTimes20DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.GFT-054 2.ONSD-512 3.ID-17013 4.IPZ-174 5.ONSD-697 6.XV-821 7.IDBD-319 8.ABBA-123 9.YUME-074 10.DSD-038 11.HYAKU-018 12.ARM-132 13.BOMN-050 14.JUSD-309 15.PSSD-202 16.DFDA-084 17.HONE-58 18.HITMA-70 19.EKDV-257 20.LIA-410 21.KWBD-048 22.ONSD-664 23.ONSD-590 24.ONSD-529 25.JOB-003 26.FRDVS-006 27.PSD-351 28.ONSD-369 29.FETI-031 30.ONSD-456 31.RKI-123 32.MMXD-007 33.IDBD-304 34.ONSD-715 35.IBW-059 36.YAG-008 37.KTDS-533 38.SGMS-104 39.NYKD-19 40.PAP-18 41.CADV-220 42.MOMD-002 43.KWBD-104 44.BNDV-00849 45.RTP-004 46.ARMD-740 47.CADV-128 48.HOV-001 49.KCC-047 50.YUPPE-4 51.NSPS-152 52.GD-930 53.DJSG-065 54.KS-8573 55.EDGD-140 56.BSJ-058 57.ALX-283 58.RGYY-040 59.CO-4603 60.EMRD-022 61.NHDTA-357 62.T28-171 63.VSPDS-538 64.TDBR-051 65.ICHD-015 66.DKSW-272 67.LMHG-004 68.IG-017 69.KTRD-053 70.BSP-014 71.054 72.512 73.17013 74.174 75.697 76.821 77.319 78.123 79.074 80.038 81.018 82.132 83.050 84.309 85.202 86.084 87.58 88.70 89.257 90.410 91.048 92.6 93.590 94.529 95.003 96.006 97.351 98.369 99.031 100.456 101.123 102.007 103.304 104.715 105.059 106.008 107.533 108.104 109.19 110.18 111.220 112.002 113.104 114.00849 115.004 116.740 117.128 118.001 119.047 120.4 121.152 122.930 123.065 124.8573 125.140 126.058 127.283 128.040 129.4603 130.022 131.357 132.171 133.538 134.051 135.015 136.272 137.004 138.017 139.053 140.014