itpro-archive
视频
|
2021-12-7 07:06
|
2024-12-3 18:56
|
148
|
60.5 GB
|
90
|
- (ISC)2/1 - Systems Security Certified Practitioner/0 - Overview of SSCP/0.0 - Overview of SSCP (90418699).mp4143.57MB
- (ISC)2/1 - Systems Security Certified Practitioner/1 - Access Controls/1.0 - Access Controls (90418697).mp4937.45MB
- (ISC)2/1 - Systems Security Certified Practitioner/2 - Security Operations and Administration/2.0 - Security Ops and Administration (90418698).mp4415.88MB
- (ISC)2/1 - Systems Security Certified Practitioner/2 - Security Operations and Administration/2.1 - Security Ops and Administration Part 2 (90538574).mp4857.81MB
- (ISC)2/1 - Systems Security Certified Practitioner/3 - Monitoring and Analysis/3.0 - Monitoring and Analysis (90691671).mp4747.66MB
- (ISC)2/1 - Systems Security Certified Practitioner/3 - Monitoring and Analysis/3.1 - Monitoring and Analysis Part 2 (90691670).mp4641.79MB
- (ISC)2/1 - Systems Security Certified Practitioner/4 - Risk, Response and Recovery/4.0 - Risk Response and Recovery (90538573).mp41.07GB
- (ISC)2/1 - Systems Security Certified Practitioner/4 - Risk, Response and Recovery/4.1 - Risk Response and Recovery Part 2 (90538572).mp4614.19MB
- (ISC)2/1 - Systems Security Certified Practitioner/5 - Cryptography/5.0 - Cryptography (90747789).mp4601.95MB
- (ISC)2/1 - Systems Security Certified Practitioner/5 - Cryptography/5.1 - Cryptography Part 2 (90747790).mp4274.24MB
- (ISC)2/1 - Systems Security Certified Practitioner/5 - Cryptography/5.2 - Cryptography Part 3 (90747791).mp4576.44MB
- (ISC)2/1 - Systems Security Certified Practitioner/6 - Networks and Communications/6.0 - Networking (90747794).mp4840.59MB
- (ISC)2/1 - Systems Security Certified Practitioner/6 - Networks and Communications/6.1 - Networking Part 2 (90901163).mp4639.99MB
- (ISC)2/1 - Systems Security Certified Practitioner/6 - Networks and Communications/6.2 - Networking Part 3 (90901164).mp4968.47MB
- (ISC)2/1 - Systems Security Certified Practitioner/7 - Malicious Code and Activity/7.0 - Malicious Code (90747792).mp4806.56MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/1.0 - Security Governance (149168786).mp4599.19MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/10.0 - Acquisition Risk Strategy (149182486).mp4559.72MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/2.0 - Compliance (149168800).mp4587.94MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/3.0 - Code of Ethics (149168869).mp4323.64MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/4.0 - Business Continuity (149168898).mp4410.51MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/5.0 - Personnel Security (149168937).mp4566.98MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/6.0 - Risk Management (149169017).mp4242.62MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/7.0 - Risk Management Part 2 (149182407).mp4574.81MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/8.0 - Risk Management Part 3 (149182423).mp4252.34MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/1 - Security and Risk Management/9.0 - Threat Modeling (149182456).mp4275.5MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/2 - Asset Security/11.0 - Asset Classification (149182511).mp4546.9MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/2 - Asset Security/12.0 - Protect Privacy (149187217).mp4587.49MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/2 - Asset Security/12.1 - Retention and Data Security (149515544).mp4593.55MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/2 - Asset Security/12.2 - Data Handling Requirements (149515545).mp4607.47MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/13.0 - Secure Design Principles (149190017).mp4409.02MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/14.0 - Security Model Concepts (149187262).mp4559.12MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/15.0 - Security Model Concepts Part 2 (149187299).mp4454.35MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/15.5 - Controls and Capabilities (149515555).mp4588.32MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/16.0 - Assess Vulnerabilities (149416131).mp4586.82MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/17.0 - Assess Vulnerabilities Part 2 (149416112).mp4309.12MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/18.0 - Assess Vulnerabilities Part 3 (149416096).mp4236.04MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/19.0 - Assess Vulnerabilities Part 4 (149438576).mp4611.74MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/19.1 - Assess Vulnerabilities Part 5 (149515548).mp4207.09MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/19.2 - Assess Vulnerabilities Part 6 (149438701).mp4615.71MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/20.0 - Apply Cryptography (149416154).mp4535.56MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/21.0 - Apply Cryptography Part 2 (149438769).mp4661.2MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/3 - Security Engineering/22.0 - Physical Security (149515556).mp4707.48MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/4 - Communication and Network Security/40.0 - Secure Network Design (149515554).mp4351.27MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/4 - Communication and Network Security/41.0 - IP Networking and Protocols (149515551).mp4462.17MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/4 - Communication and Network Security/42.0 - IP Networking and Protocols Part 2 (149515550).mp4571.89MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/4 - Communication and Network Security/43.0 - Securing Network Devices (149515553).mp4577.56MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/4 - Communication and Network Security/44.0 - Secure Communications (149515552).mp4607.69MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/4 - Communication and Network Security/45.0 - Secure Communications Part 2 (149515547).mp4609.03MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/4 - Communication and Network Security/46.0 - Mitigate Network Attacks (149515543).mp4566.1MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/5 - Identity and Access Management/50.0 - Identification and Authorization (149515546).mp4557.45MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/5 - Identity and Access Management/51.0 - Manage Authentication (149522114).mp4623.75MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/5 - Identity and Access Management/52.0 - Manage Authentication Part 2 (149522116).mp4538.76MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/5 - Identity and Access Management/53.0 - Manage Authentication Part 3 (149522115).mp4567.59MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/6 - Security Assessment and Testing/60.0 - Assessment and Testing (149522118).mp4617.4MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/6 - Security Assessment and Testing/61.0 - Assessment and Testing Part 2 (149522120).mp4566.96MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/6 - Security Assessment and Testing/62.0 - Assessment and Testing Part 3 (149522117).mp4560.82MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/7 - Security Operations/70.0 - Investigations (149521904).mp4569.57MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/7 - Security Operations/71.0 - Secure Operations Concepts (149522121).mp4596.15MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/7 - Security Operations/72.0 - Resource Protection (149522119).mp4346.38MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/7 - Security Operations/73.0 - Incident Management (149522124).mp4508.08MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/7 - Security Operations/74.0 - Preventative Measures (149522122).mp4502.49MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/7 - Security Operations/75.0 - Recovery Strategies (149522123).mp4612.07MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/7 - Security Operations/76.0 - Recovery Strategies Part 2 (167886174).mp4550.67MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/7 - Security Operations/77.0 - Physical _ Personnel Security (149522126).mp4456.53MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/8 - Software Development Security/80.0 - Software Dev Security (150720776).mp4637.01MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/8 - Software Development Security/81.0 - Software Dev Security Part 2 (150720775).mp4639.82MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/8 - Software Development Security/82.0 - Software Dev Security Part 3 (150720777).mp4677.05MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/8 - Software Development Security/83.0 - Software Dev Security Part 4 (150720773).mp4559.27MB
- (ISC)2/2 - Certified Information Systems Security Professional (UPDATED 2016)/8 - Software Development Security/84.0 - Software Dev Security Part 5 (150720774).mp4546.1MB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/1 - Architectural Concepts and Design Requirements/0.0 - Overview (163691830).mp4170.65MB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/1 - Architectural Concepts and Design Requirements/1.0 - Cloud Computing Concepts (162678556).mp41.18GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/1 - Architectural Concepts and Design Requirements/2.0 - Describe Cloud Reference Architecture (162681251).mp41.32GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/1 - Architectural Concepts and Design Requirements/3.0 - Describe Cloud Reference Architecture Part 2 (162682253).mp41.05GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/1 - Architectural Concepts and Design Requirements/4.0 - Cloud Security Concepts (162684045).mp41.12GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/1 - Architectural Concepts and Design Requirements/5.0 - Cloud Security Concepts Part 2 (163707554).mp41.16GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/1 - Architectural Concepts and Design Requirements/6.0 - Secure Cloud Design Principles (162686535).mp4804.09MB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/2 - Cloud Data Security/20.0 - Cloud Data Security (162846030).mp41.02GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/2 - Cloud Data Security/21.0 - Cloud Data Storage Architectures (162840405).mp41.22GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/2 - Cloud Data Security/22.0 - Cloud Data Security Strategies (162843995).mp41.19GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/2 - Cloud Data Security/23.0 - Cloud Data Security Strategies Part 2 (162843989).mp41.08GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/2 - Cloud Data Security/24.0 - Cloud Data Security Strategies Part 3 (162840244).mp4867.9MB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/2 - Cloud Data Security/25.0 - Cloud Data Discovery and Classification (162836807).mp41.05GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/2 - Cloud Data Security/26.0 - Designing Appropriate Data Protection (162837134).mp41.16GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/2 - Cloud Data Security/27.0 - Data Rights Mgmt Retention and Data Events (162834135).mp41.21GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/3 - Cloud Platform and Infrastructure Security/30.0 - Cloud Infrastructure Components (162833889).mp41.3GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/3 - Cloud Platform and Infrastructure Security/31.0 - Cloud Infrastructure Risks (162830959).mp41.31GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/3 - Cloud Platform and Infrastructure Security/32.0 - Design and Plan Security Controls (162830474).mp41.26GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/3 - Cloud Platform and Infrastructure Security/33.0 - Design and Plan Security Controls Part 2 (163742922).mp41.18GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/3 - Cloud Platform and Infrastructure Security/34.0 - Disaster, Recovery, and Business Continuity (162989906).mp41.33GB
- (ISC)2/4 - Certified Cloud Security Professional (UPDATED 2016)/3 - Cloud Platform and Infrastructure Security/35.0 - Disaster, Recovery and Business Continuity Part 2 (162990585).mp41.1GB
不会用的朋友看这里
把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载!
亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:[email protected]
概述
838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题
它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息
838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪
838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统