RAR-files |
linkedin.learning.owasp.top.10.3.injection.and.4.insecure.design-xqzt.rar |
50,000,000 |
7A2E3793 |
linkedin.learning.owasp.top.10.3.injection.and.4.insecure.design-xqzt.r00 |
50,000,000 |
CA6151C2 |
linkedin.learning.owasp.top.10.3.injection.and.4.insecure.design-xqzt.r01 |
16,919,726 |
718E744B |
|
Total size: |
116,919,726 |
|
|
Archived
files |
01.01-2021_owasp_top_10.mkv
[920eadadc7436c74]
|
6,409,257 |
088F7CF1 |
01.02-what_you_should_know.mkv
[12a7c690a6021a10]
|
1,374,098 |
630AE5E5 |
02.01-what_is_injection.mkv
[36f29b4143722854]
|
8,160,809 |
5F0CFA41 |
02.02-example_1_2008_heartland_data_breach.mkv
[b4ef417f7e2be595]
|
6,457,970 |
20EA82A9 |
02.03-example_2_2020_accellion_data_breach.mkv
[7c27ada6fe86b219]
|
6,968,194 |
09F23774 |
02.04-prevention_technique_1_prepared_statements.mkv
[a81a0170e67fdc95]
|
9,084,239 |
D080D120 |
02.05-prevention_technique_2_input_validation.mkv
[e4a78519506d2197]
|
8,024,980 |
9B69FF28 |
02.06-prevention_technique_3_escape_special_characters.mkv
[692fd36534d3554d]
|
6,291,321 |
A8EDEAA9 |
03.01-what_is_insecure_design.mkv
[139e57f321fd33cd]
|
10,336,465 |
31A0E0C1 |
03.02-real-world_example_1_g_suite_accounts_in_2018.mkv
[cf547c2584f4b1c6]
|
5,669,520 |
7AF5CA1B |
03.03-real-world_example_2_2021_manufacturing_data_risk_report.mkv
[3d2904c23f4f327a]
|
8,338,574 |
BF53DD0C |
03.04-prevention_technique_1_threat_modeling.mkv
[c850695def035629]
|
8,957,186 |
F2409806 |
03.05-prevention_technique_2_secure_design_patterns_and_principles.mkv
[830d8fbf9b0807a5]
|
12,209,439 |
374028FB |
03.06-prevention_technique_3_secure_development_lifecycle.mkv
[cd9e216c6e4dc6c8]
|
10,219,791 |
B731E98D |
04.01-next_steps.mkv
[e9c8573fadbac3dc]
|
8,416,327 |
D4D08462 |
|
Total size: |
116,918,170 |
|
|