首页 磁力链接怎么用

Lynda - Protecting Your Network with Open-Source Software

文件类型 收录时间 最后活跃 资源热度 文件大小 文件数量
视频 2017-9-5 11:10 2024-7-18 09:52 135 301.29 MB 45
二维码链接
Lynda - Protecting Your Network with Open-Source Software的二维码
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
文件列表
  1. 00. Introduction/00_01 - Welcome.mp412.15MB
  2. 00. Introduction/00_02 - What you should know before watching this course.mp43.11MB
  3. 01. Understanding Firewalls/01_01 - What is a firewall.mp46.04MB
  4. 01. Understanding Firewalls/01_02 - A host firewall.mp47.63MB
  5. 01. Understanding Firewalls/01_03 - A network firewall.mp46.41MB
  6. 01. Understanding Firewalls/01_04 - Static packet filtering (SPF) vs. stateful packet inspection (SPI).mp45.2MB
  7. 02. Host as a Router/02_01 - Netfilter and iptables.mp45.76MB
  8. 02. Host as a Router/02_02 - Using iptables to set up a host firewall.mp415.55MB
  9. 02. Host as a Router/02_03 - Creating a shell script to automate configuring Netfilter.mp412.43MB
  10. 02. Host as a Router/02_04 - Understanding hosts as routers.mp44.66MB
  11. 02. Host as a Router/02_05 - Host as a router Including an additional network adapter.mp411.14MB
  12. 02. Host as a Router/02_06 - Host as a router Setting up a second host to test the router.mp47.76MB
  13. 02. Host as a Router/02_07 - Host as a router Setting up IP forwarding.mp46.69MB
  14. 02. Host as a Router/02_08 - Host as a router Configuring the router's Netfilter settings.mp410.76MB
  15. 02. Host as a Router/02_09 - Host as a router Testing.mp44.28MB
  16. 03. Host as a Firewall/03_01 - Understanding using a host as a network firewall.mp45.6MB
  17. 03. Host as a Firewall/03_02 - Setting up a web server to receive forwarded packets.mp43MB
  18. 03. Host as a Firewall/03_03 - Configuring port forwarding by adding Netfilter rules.mp49.37MB
  19. 03. Host as a Firewall/03_04 - Testing port forwarding.mp43.29MB
  20. 03. Host as a Firewall/03_05 - Understanding one-legged demilitarized zones (DMZs) using iptables.mp45.36MB
  21. 03. Host as a Firewall/03_06 - Using iptables to set up a one-legged DMZ.mp46.15MB
  22. 03. Host as a Firewall/03_07 - Using iptables to set up a true DMZ.mp42.97MB
  23. 03. Host as a Firewall/03_08 - Understanding Squid, an application proxy firewall.mp45.35MB
  24. 03. Host as a Firewall/03_09 - Setting up Squid.mp49.9MB
  25. 03. Host as a Firewall/03_10 - Fine-tuning the Ubuntu router host.mp413.1MB
  26. 04. Packet Analysis/04_01 - What is a packet analysis.mp45.02MB
  27. 04. Packet Analysis/04_02 - Packet-analysis applications in network security ARP poisoning example.mp49.31MB
  28. 04. Packet Analysis/04_03 - Packet capturing with Wireshark.mp49.61MB
  29. 04. Packet Analysis/04_04 - Exploring Wireshark's advanced features.mp42.92MB
  30. 04. Packet Analysis/04_05 - Demonstrating Wireshark's advanced features.mp411.09MB
  31. 05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_01 - What is an IDS.mp45.37MB
  32. 05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_02 - Introducing Snort.mp44.05MB
  33. 05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_03 - Snort as a packet sniffer.mp48.42MB
  34. 05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_04 - Snort as an IDS Establishing rules.mp47.72MB
  35. 05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_05 - Snort as an IDS Detecting pings.mp46.76MB
  36. 05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_06 - What is network vulnerability assessment.mp46.8MB
  37. 05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_07 - Nessus.mp43.37MB
  38. 05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_08 - Network scanning with Nessus.mp43.85MB
  39. 06. Logging and Monitoring/06_01 - Logging and its significance.mp43.06MB
  40. 06. Logging and Monitoring/06_02 - Syslog-ng.mp42.06MB
  41. 06. Logging and Monitoring/06_03 - Log forwarding using syslog-ng Part one.mp46.51MB
  42. 06. Logging and Monitoring/06_04 - Log forwarding using syslog-ng Part two.mp410.81MB
  43. 06. Logging and Monitoring/06_05 - Kiwi.mp44.39MB
  44. 06. Logging and Monitoring/06_06 - Simple Network Management Protocol (SNMP).mp44.33MB
  45. 06. Logging and Monitoring/07_01 - Next steps.mp42.18MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!

违规内容投诉邮箱:[email protected]

概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统