pluralsight.com - Web Security and the OWASP Top 10 - The Big Picture - TorrentBank

File Name:pluralsight.com - Web Security and the OWASP Top 10 - The Big Picture

Create Tool:uTorrent/3320

Create Time:2014-03-29 04:18:06

File Size:269.47 MB

File Count:41

File Hash:3700e7db70495df68cf2271b4fde749c8732f583

Magnet Link:

Magnet Link:

Torrent File:

01. Introduction/01_01-Introduction.mp4 16.94 MB
02. Injection/02_01-Overview.mp4 8.22 MB
02. Injection/02_02-Mounting an Attack.mp4 5.02 MB
02. Injection/02_03-Defences.mp4 9.67 MB
02. Injection/02_04-The risk in Practice.mp4 5.29 MB
03. Broken Authentication and Session Management/03_01-Overview.mp4 5.42 MB
03. Broken Authentication and Session Management/03_02-Mounting an Attack.mp4 9.25 MB
03. Broken Authentication and Session Management/03_03-Defences.mp4 9.89 MB
03. Broken Authentication and Session Management/03_04-The risk in Practice.mp4 3.71 MB
04. Cross-Site Scripting (XSS)/04_01-Overview.mp4 10.24 MB
04. Cross-Site Scripting (XSS)/04_02-Mounting an Attack.mp4 4.30 MB
04. Cross-Site Scripting (XSS)/04_03-Defences.mp4 5.66 MB
04. Cross-Site Scripting (XSS)/04_04-The risk in Practice.mp4 10.03 MB
05. Insecure Direct Object References/05_01-Overview.mp4 5.17 MB
05. Insecure Direct Object References/05_02-Mounting an Attack.mp4 4.26 MB
05. Insecure Direct Object References/05_03-Defences.mp4 10.95 MB
05. Insecure Direct Object References/05_04-The risk in Practice.mp4 3.82 MB
06. Security Misconfiguration/06_01-Overview.mp4 4.08 MB
06. Security Misconfiguration/06_02-Mounting an Attack.mp4 6.26 MB
06. Security Misconfiguration/06_03-Defences.mp4 6.82 MB
06. Security Misconfiguration/06_04-The risk in Practice.mp4 4.63 MB
07. Sensitive Data Exposure/07_01-Overview.mp4 4.80 MB
07. Sensitive Data Exposure/07_02-Mounting an Attack.mp4 8.90 MB
07. Sensitive Data Exposure/07_03-Defences.mp4 6.67 MB
07. Sensitive Data Exposure/07_04-The risk in Practice.mp4 5.18 MB
08. Missing Function Level Access Control/08_01-Overview.mp4 5.81 MB
08. Missing Function Level Access Control/08_02-Mounting an Attack.mp4 6.54 MB
08. Missing Function Level Access Control/08_03-Defences.mp4 8.73 MB
08. Missing Function Level Access Control/08_04-The risk in Practice.mp4 6.01 MB
09. Cross-Site Request Forgery (CSRF)/09_01-Overview.mp4 6.17 MB
09. Cross-Site Request Forgery (CSRF)/09_02-Mounting an Attack.mp4 5.19 MB
09. Cross-Site Request Forgery (CSRF)/09_03-Defences.mp4 7.86 MB
09. Cross-Site Request Forgery (CSRF)/09_04-The risk in Practice.mp4 5.88 MB
10. Using Components with Known Vulnerabilities/10_01-Overview.mp4 5.37 MB
10. Using Components with Known Vulnerabilities/10_02-Mounting an Attack.mp4 4.44 MB
10. Using Components with Known Vulnerabilities/10_03-Defences.mp4 5.72 MB
10. Using Components with Known Vulnerabilities/10_04-The risk in Practice.mp4 4.90 MB
11. Unvalidated Redirects and Forwards/11_01-Overview.mp4 4.80 MB
11. Unvalidated Redirects and Forwards/11_02-Mounting an Attack.mp4 4.63 MB
11. Unvalidated Redirects and Forwards/11_03-Defences.mp4 4.62 MB
11. Unvalidated Redirects and Forwards/11_04-The risk in Practice.mp4 7.63 MB
http://bt2.rutracker.org/ann?uk=pN1rWqEF97
http://retracker.local/announce

TorrentBank
Copyright © 2024