|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585б |
| 0 |
2.48Кб |
| 001 ASVS-checklist-en.xlsx |
67.02Кб |
| 001 Comparative-Analysis-of-Cryptographic-Key-Management-Systems.pdf |
396.14Кб |
| 001 Cryptographic Failures - OWASP A022021.mp4 |
4.59Мб |
| 001 CryptSDLC-Embedding-Cryptographic-Engineering-into-Secure-Software-Development-Lifecycle.pdf |
815.87Кб |
| 001 Defense in depth.mp4 |
16.64Мб |
| 001 defense-in-depth-revisited-one-column.pdf |
51.41Кб |
| 001 How can you test whether you website uses the latest security protocols.mp4 |
2.78Мб |
| 001 Introduction OWASP top 10 (2017).mp4 |
14.23Мб |
| 001 NCCIC-ICS-CERT-Defense-in-Depth-2016-S508C.pdf |
7.26Мб |
| 001 Organizational-Practices-in-Cryptographic-Development-and-Testing.pdf |
425.05Кб |
| 001 OWASP-Application-Security-Verification-Standard-4.0-en.pdf |
1.01Мб |
| 001 SSLLabs-link.docx |
29.03Кб |
| 001 XML external entities - OWASP A42017.mp4 |
9.04Мб |
| 002 A-Modeling-Framework-for-Data-Protection-by-Design.pdf |
1.81Мб |
| 002 BakingTimer-Privacy-Analysis-of-Server-Side-Request-Processing-Time.pdf |
629.84Кб |
| 002 Design-Methodologies-for-Securing-Cyber-Physical-Systems.pdf |
1.49Мб |
| 002 Insecure deserialization - OWASP A82017.mp4 |
8.53Мб |
| 002 Insecure Design - OWASP A042021.mp4 |
6.63Мб |
| 002 STRIDE.mp4 |
6.36Мб |
| 002 STRIDE-links.docx |
14.19Кб |
| 002 Test-hacking-skill-free-link.docx |
31.33Кб |
| 002 The-Application-of-a-New-Secure-Software-Development-Life-Cycle-S-SDLC-with-Agile-Methodologies.pdf |
2.07Мб |
| 002 Threat-Anlaysis-Stride-Model.xlsx |
42.05Кб |
| 002 UPDATED - OWASP top 10 (2021).mp4 |
1.95Мб |
| 002 WAS.pdf |
368.86Кб |
| 002 Where can I (legally) test my hacking skills for free.mp4 |
2.77Мб |
| 003 A-novel-technique-to-prevent-SQL-injection-and-cross-site-scripting-attacks.pdf |
3.10Мб |
| 003 Comparison-of-SDL-and-Touchpoints.pdf |
441.68Кб |
| 003 Defeating-SQL-Injection.pdf |
1.09Мб |
| 003 Injection.mp4 |
13.82Мб |
| 003 Insufficient logging and monitoring - OWASP A102017.mp4 |
23.71Мб |
| 003 On-the-secure-software-development-process-CLASP-SDL-and-Touchpoints-compared.pdf |
1.64Мб |
| 003 OWASP-Cheatsheets-Book.pdf |
1.11Мб |
| 003 OWASP-Top-10-2017-Release-Candidate1-English.pdf |
1.14Мб |
| 003 Secure development processes.mp4 |
13.41Мб |
| 003 Secure-development-process-links.docx |
14.09Кб |
| 003 Software and Data Integrity Failures - OWASP A082021.mp4 |
9.79Мб |
| 003 Software-security-building-security-in.pdf |
385.48Кб |
| 003 Software-Security-in-Practice.pdf |
1.61Мб |
| 003 What are insecure direct object references.mp4 |
4.67Мб |
| 003 You-shall-not-pass-Mitigating-SQL-Injection-Attacks-on-Legacy-Web-Applications.pdf |
676.86Кб |
| 004 Broken Authentication and Session management.mp4 |
10.29Мб |
| 004 Preventing-Server-Side-Request-Forgery-Attacks.pdf |
552.63Кб |
| 004 Root-Cause-Analysis-of-Session-Management-and-Broken-Authentication-Vulnerabilities.docx |
122.20Кб |
| 004 Server-Side Request Forgery - OWASP A102021.mp4 |
5.57Мб |
| 005 Cross-Site Scripting (XSS).mp4 |
8.09Мб |
| 005 Cross-site-scripting-links.docx |
13.69Кб |
| 006 Broken Access Control.mp4 |
8.25Мб |
| 006 Broken-Access-Control-links.docx |
38.01Кб |
| 007 Holistic-Web-Application-Security-Visualization-for-Multi-Project-and-Multi-Phase-Dynamic-Application-Security-Test-Results.pdf |
6.11Мб |
| 007 Security Misconfiguration.mp4 |
22.24Мб |
| 007 Security-misconfiguration-links.docx |
13.85Кб |
| 008 Sensitive Data Exposure.mp4 |
12.84Мб |
| 008 Sensitive-data-exposure-links.docx |
13.85Кб |
| 009 Insufficient Attack Protection.mp4 |
5.71Мб |
| 009 Insufficient-attact-protection-links.docx |
15.56Кб |
| 010 Cross-Site Request Forgery (CSRF).mp4 |
11.09Мб |
| 010 Robust-defenses-for-cross-site-request-forgery.pdf |
2.95Мб |
| 011 Using Components with Known Vulnerabilities.mp4 |
14.59Мб |
| 011 Using-components-with-known-vulnerabilities-links.docx |
13.96Кб |
| 012 AUTHENTICATION-AND-AUTHORIZATION-IN-MICROSERVICE-BASED-SYSTEMS-SURVEY-OF-ARCHITECTURE-PATTERNS.pdf |
973.14Кб |
| 012 microservices-API-security.pdf |
1.11Мб |
| 012 SECURING-MICROSERVICES-AND-MICROSERVICE-ARCHITECTURES-A-SYSTEMATIC-MAPPING-STUDY.pdf |
1.10Мб |
| 012 Underprotected APIs.mp4 |
10.38Мб |
| 012 Underprotected-APIs-links.docx |
14.19Кб |
| 1 |
10.20Кб |
| 10 |
219.46Кб |
| 11 |
214.23Кб |
| 12 |
210.92Кб |
| 13 |
228.89Кб |
| 14 |
1.63Кб |
| 15 |
167.69Кб |
| 16 |
247.48Кб |
| 17 |
122.21Кб |
| 18 |
142.23Кб |
| 19 |
140.20Кб |
| 2 |
4.73Кб |
| 20 |
45.86Кб |
| 21 |
185.81Кб |
| 22 |
79.51Кб |
| 23 |
167.47Кб |
| 24 |
156.11Кб |
| 25 |
49.02Кб |
| 26 |
220.68Кб |
| 27 |
232.76Кб |
| 28 |
186.17Кб |
| 29 |
50.89Кб |
| 3 |
3.30Кб |
| 30 |
197.52Кб |
| 31 |
109.06Кб |
| 32 |
139.00Кб |
| 33 |
10.82Кб |
| 34 |
113.60Кб |
| 35 |
144.09Кб |
| 36 |
146.29Кб |
| 37 |
153.50Кб |
| 38 |
166.16Кб |
| 39 |
240.73Кб |
| 4 |
8.30Кб |
| 40 |
50.86Кб |
| 41 |
208.13Кб |
| 42 |
91.14Кб |
| 43 |
138.16Кб |
| 44 |
215.37Кб |
| 45 |
70.32Кб |
| 46 |
86.95Кб |
| 47 |
115.86Кб |
| 48 |
126.52Кб |
| 5 |
6.51Кб |
| 6 |
87.88Кб |
| 7 |
163.59Кб |
| 8 |
166.35Кб |
| 9 |
125.00Кб |
| external-assets-links.txt |
171б |
| TutsNode.com.txt |
63б |