Old Search System: security eps




  • Mini square - 40 Security Icons

    Mini square - 40 Security Icons AI, EPS, PNG, SVG | 24(w) x 24(h) px...





  • Azure Storage Security Guide

    Azure Storage Security Guide MP4 | Video: h264, 1280x720 | Audio: AAC, 48 KHz, 2...


    What you\'ll learn
    Secure Data in Azure
    Monitor security events using Storage Analytics
    Requirements
    Basic understanding of data storage in Azure - for example, Storage Accounts and objects
    Description
    Azure Security Engineers implement security controls and threat protection, manage identity and access, and protect data, applications, and networks in cloud...


  • Lynda - DevSecOps: Continuous Application Security

    Lynda - DevSecOps: Continuous Application SecurityEnglish | 45m | Video: 720p With DevOps continuing...






  • Lynda - ASP.NET Core: Security (2019)

    Lynda - ASP.NET Core: Security (2019) English | 1hr 22m | Video: 720p | Subtitles...






  • iThemes - Security Pro v6.1.3 - WordPress Security Plugin + iThemes Security Pro - Local QR Codes v1.0.1

    iThemes - Security Pro v6.1.3 - WordPress Security Plugin + iThemes Security Pro - Local...





  • Nmap for Information Security Professionals

    Nmap for Information Security Professionals English | 4.5 hrs | Video 720p Stop looking-out for...


    What you'll learn You will be Pro in Nmap commands and you can use them for Ethical Hacking, Network Auditing, Pentesting Hosts and Auditing System Administrative Services. Reconnaissance of the target using different Nmap Discovery commands. Learn Nmap Advanced Scanning to scan target more effectively. Instead of using default ports,...


  • McAfee Endpoint Security 10.6.1.1340.1 Multilingual

    McAfee Endpoint Security 10.6.1.1340.1 Multilingual | 224 MB Our new endpoint protection suites emphasize...


    The volume and sophistication of endpoint threats has steadily grown as adversaries target these often mobile and remote assets as initial attack footholds. Adding to the challenge, security teams, after years of bolting endpoint security point products together, are now managing an average of ten different agents and five different...


  • Security Outsourcing: Vendor Selection and Management

    Security Outsourcing: Vendor Selection and Management English | 1h 6m | Video 720p


    Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best...


  • SecuritySpy 5.0.1 macOS

    SecuritySpy 5.0.1 macOS | 13 MB SecuritySpy is a multi-camera video surveillance app. With features...


    SecuritySpy\'s flexibility and comprehensive list of features allows users to set up a system tailored to their individual needs. Whether it is a system with a single camera or many dozens, in a domestic or business environment, SecuritySpy is ideal. Features Displays and captures live video from multiple cameras simultaneously...


  • Cyber Security - Python and Web Applications

    Cyber Security - Python and Web Applications MP4 | Video: AVC, 1280x720 | Audio: AAC,...


    Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more! What you'll learn Start a career in Cyber Security Analyze systems for vulnerabilities and security flaws Build secure web applications Use Python to build tools for security analysis Use Python to build general...


  • Lynda - Juniper Security Policies Fundamentals

    Lynda - Juniper Security Policies FundamentalsEnglish | 1h 27m | Video: 720p Juniper security...






  • Lynda - ASP.NET: Security

    Lynda - ASP.NET: SecurityEnglish | 2h 26m | Video: 720p As many as nine...






  • Payment Security Isometric

    Security should always be the first priority when selling online. Customers are more and more...





  • Security Home Logo

    Files Include: 2 AI Files for Illustrator CS5 and Illustrator 10 2 EPS Files for...





  • PacktPub - Spring Security

    PacktPub - Spring Security https://www.packtpub.com/application-development/spring-security-video An empirical approach to securing your web applications


    Learn Implement the basic security for a web application starting with authentication and authorization techniques Dig deeper into the process of registration, from raw JDBC to the implementation of a more mature and production-ready Hibernate/JPA implementation Discuss and learn how to implement Remember Me for a web application along with...


  • CM - Security Illustrations 3431355

    CM - Security Illustrations 3431355 Sale Page The pack includes all 9 of our beautiful...





  • Lynda - Web Security: Same-Origin Policies

    Lynda - Web Security: Same-Origin Policies https://www.lynda.com/javascript-tutorials/Web-Security-Same-Origin-Policies/794147-2.html In network communications, knowing where something came from...


    Topics include: Working with browser security features Configuring servers for testing Defining an origin Cross-site scripting attacks Cross-site request forgery attacks Working with a received message Specifying the allowed message sender origin Sharing cookies across subdomains Restricting the path of a cookie


  • Corporate Computer Security (4th Edition)

    Corporate Computer Security (4th Edition) by Randy J. BoyleEnglish | 2015 | ISBN: 0133545199 |...


    Corporate Computer Security provides a strong business focus along with a solid technical understanding of security tools. This text gives students the IT security skills they need for the workplace.
    This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.



  • Information Security & Cyber Security - Made Easy! (Updated)

    Information Security & Cyber Security - Made Easy! (Updated) MP4 | Video: h264, 1280x720 |...


    What you\'ll learn
    Students who complete this course will go from having no prior knowledge of Cyber Security to having an advanced understanding of core principals, theoretical knowledge, and real world applications.
    Learn Information and Cybersecurity efficiently with my included FREE DOWNLOADABLE PDF COURSE NOTES!!!!
    Students will learn about a...


  • GraphicRiver - Modern Security Flyer 22525927

    GraphicRiver - Modern Security Flyer 22525927 A modern flyer design for your security company in...