Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
2.48Кб |
001 ASVS-checklist-en.xlsx |
67.02Кб |
001 Comparative-Analysis-of-Cryptographic-Key-Management-Systems.pdf |
396.14Кб |
001 Cryptographic Failures - OWASP A022021.mp4 |
4.59Мб |
001 CryptSDLC-Embedding-Cryptographic-Engineering-into-Secure-Software-Development-Lifecycle.pdf |
815.87Кб |
001 Defense in depth.mp4 |
16.64Мб |
001 defense-in-depth-revisited-one-column.pdf |
51.41Кб |
001 How can you test whether you website uses the latest security protocols.mp4 |
2.78Мб |
001 Introduction OWASP top 10 (2017).mp4 |
14.23Мб |
001 NCCIC-ICS-CERT-Defense-in-Depth-2016-S508C.pdf |
7.26Мб |
001 Organizational-Practices-in-Cryptographic-Development-and-Testing.pdf |
425.05Кб |
001 OWASP-Application-Security-Verification-Standard-4.0-en.pdf |
1.01Мб |
001 SSLLabs-link.docx |
29.03Кб |
001 XML external entities - OWASP A42017.mp4 |
9.04Мб |
002 A-Modeling-Framework-for-Data-Protection-by-Design.pdf |
1.81Мб |
002 BakingTimer-Privacy-Analysis-of-Server-Side-Request-Processing-Time.pdf |
629.84Кб |
002 Design-Methodologies-for-Securing-Cyber-Physical-Systems.pdf |
1.49Мб |
002 Insecure deserialization - OWASP A82017.mp4 |
8.53Мб |
002 Insecure Design - OWASP A042021.mp4 |
6.63Мб |
002 STRIDE.mp4 |
6.36Мб |
002 STRIDE-links.docx |
14.19Кб |
002 Test-hacking-skill-free-link.docx |
31.33Кб |
002 The-Application-of-a-New-Secure-Software-Development-Life-Cycle-S-SDLC-with-Agile-Methodologies.pdf |
2.07Мб |
002 Threat-Anlaysis-Stride-Model.xlsx |
42.05Кб |
002 UPDATED - OWASP top 10 (2021).mp4 |
1.95Мб |
002 WAS.pdf |
368.86Кб |
002 Where can I (legally) test my hacking skills for free.mp4 |
2.77Мб |
003 A-novel-technique-to-prevent-SQL-injection-and-cross-site-scripting-attacks.pdf |
3.10Мб |
003 Comparison-of-SDL-and-Touchpoints.pdf |
441.68Кб |
003 Defeating-SQL-Injection.pdf |
1.09Мб |
003 Injection.mp4 |
13.82Мб |
003 Insufficient logging and monitoring - OWASP A102017.mp4 |
23.71Мб |
003 On-the-secure-software-development-process-CLASP-SDL-and-Touchpoints-compared.pdf |
1.64Мб |
003 OWASP-Cheatsheets-Book.pdf |
1.11Мб |
003 OWASP-Top-10-2017-Release-Candidate1-English.pdf |
1.14Мб |
003 Secure development processes.mp4 |
13.41Мб |
003 Secure-development-process-links.docx |
14.09Кб |
003 Software and Data Integrity Failures - OWASP A082021.mp4 |
9.79Мб |
003 Software-security-building-security-in.pdf |
385.48Кб |
003 Software-Security-in-Practice.pdf |
1.61Мб |
003 What are insecure direct object references.mp4 |
4.67Мб |
003 You-shall-not-pass-Mitigating-SQL-Injection-Attacks-on-Legacy-Web-Applications.pdf |
676.86Кб |
004 Broken Authentication and Session management.mp4 |
10.29Мб |
004 Preventing-Server-Side-Request-Forgery-Attacks.pdf |
552.63Кб |
004 Root-Cause-Analysis-of-Session-Management-and-Broken-Authentication-Vulnerabilities.docx |
122.20Кб |
004 Server-Side Request Forgery - OWASP A102021.mp4 |
5.57Мб |
005 Cross-Site Scripting (XSS).mp4 |
8.09Мб |
005 Cross-site-scripting-links.docx |
13.69Кб |
006 Broken Access Control.mp4 |
8.25Мб |
006 Broken-Access-Control-links.docx |
38.01Кб |
007 Holistic-Web-Application-Security-Visualization-for-Multi-Project-and-Multi-Phase-Dynamic-Application-Security-Test-Results.pdf |
6.11Мб |
007 Security Misconfiguration.mp4 |
22.24Мб |
007 Security-misconfiguration-links.docx |
13.85Кб |
008 Sensitive Data Exposure.mp4 |
12.84Мб |
008 Sensitive-data-exposure-links.docx |
13.85Кб |
009 Insufficient Attack Protection.mp4 |
5.71Мб |
009 Insufficient-attact-protection-links.docx |
15.56Кб |
010 Cross-Site Request Forgery (CSRF).mp4 |
11.09Мб |
010 Robust-defenses-for-cross-site-request-forgery.pdf |
2.95Мб |
011 Using Components with Known Vulnerabilities.mp4 |
14.59Мб |
011 Using-components-with-known-vulnerabilities-links.docx |
13.96Кб |
012 AUTHENTICATION-AND-AUTHORIZATION-IN-MICROSERVICE-BASED-SYSTEMS-SURVEY-OF-ARCHITECTURE-PATTERNS.pdf |
973.14Кб |
012 microservices-API-security.pdf |
1.11Мб |
012 SECURING-MICROSERVICES-AND-MICROSERVICE-ARCHITECTURES-A-SYSTEMATIC-MAPPING-STUDY.pdf |
1.10Мб |
012 Underprotected APIs.mp4 |
10.38Мб |
012 Underprotected-APIs-links.docx |
14.19Кб |
1 |
10.20Кб |
10 |
219.46Кб |
11 |
214.23Кб |
12 |
210.92Кб |
13 |
228.89Кб |
14 |
1.63Кб |
15 |
167.69Кб |
16 |
247.48Кб |
17 |
122.21Кб |
18 |
142.23Кб |
19 |
140.20Кб |
2 |
4.73Кб |
20 |
45.86Кб |
21 |
185.81Кб |
22 |
79.51Кб |
23 |
167.47Кб |
24 |
156.11Кб |
25 |
49.02Кб |
26 |
220.68Кб |
27 |
232.76Кб |
28 |
186.17Кб |
29 |
50.89Кб |
3 |
3.30Кб |
30 |
197.52Кб |
31 |
109.06Кб |
32 |
139.00Кб |
33 |
10.82Кб |
34 |
113.60Кб |
35 |
144.09Кб |
36 |
146.29Кб |
37 |
153.50Кб |
38 |
166.16Кб |
39 |
240.73Кб |
4 |
8.30Кб |
40 |
50.86Кб |
41 |
208.13Кб |
42 |
91.14Кб |
43 |
138.16Кб |
44 |
215.37Кб |
45 |
70.32Кб |
46 |
86.95Кб |
47 |
115.86Кб |
48 |
126.52Кб |
5 |
6.51Кб |
6 |
87.88Кб |
7 |
163.59Кб |
8 |
166.35Кб |
9 |
125.00Кб |
external-assets-links.txt |
171б |
TutsNode.com.txt |
63б |