Showing 1,881-1,900 of 2,221 items.

mp4 packtpub.com - JIRA 6 Essentials ® vampiri6ka

Hot:226  Size:320.66 MB  Created:2017-08-27 21:03:40  File Count:37

06 Notifications/28 Create Custom Events and e-mail Templates.mp4  13.81 MB
05 Security and Permissions/23 Control Project and Issue Operation Access with Permission Scheme.mp4  13.31 MB
03 Working with Screens and Fields/15 Apply Field Configuration to Specific Issue Types and Projects.mp4  13.04 MB
02 Working with Issues/07 Operate and Work with Issues.mp4  12.56 MB
04 Workflows/20 Apply Multiple Workflows to One Project.mp4  12.26 MB

mp4 Lynda - Agile Project Management with Bob Mcgannon

Hot:380  Size:274.28 MB  Created:2017-08-26 18:47:43  File Count:26

01_04-speculate.mp4  27.72 MB
01_01-agile.mp4  22.71 MB
06_03-next_steps.mp4  20.74 MB
02_01-selecting.mp4  19.71 MB
03_01-collecting.mp4  19.38 MB

mp4 [DesireCourse.Net] Udemy - Learn Wi-Fi Password Penetration Testing (WEPWPAWPA2)

Hot:62  Size:740.17 MB  Created:2019-07-19 12:49:51  File Count:100

01 Preparation/002 Installing Kali Linux As a Virtual Machine.mp4  79.38 MB
08 Protection/044 Securing Systems From The Above Attacks.mp4  50.11 MB
06 WPAWPA2 Cracking - Wordlist Attacks/039 Cracking WPAWPA2 Much Faster Using GPU - Part 2.mp4  33.79 MB
08 Protection/045 How to Configure Wireless Security Settings To Secure Your Network.mp4  28.66 MB
01 Preparation/003 Basic Overview Of Kali Linux.mp4  26.56 MB

mp4 Udemy - Learn The Basics of Ethical Hacking and Penetration Testing

Hot:341  Size:3.15 GB  Created:2017-08-30 17:40:37  File Count:55

Section 8 - Windows Exploit Development/54. Using Immunity Debugger and Metasploit to develop a windows exploit.mp4  458 MB
Section 7 - Web Exploitation Techniques/48. Exploiting SQL Injection to Full System Access (MYSQL).mp4  237.49 MB
Section 5 - Windows and Linux Attacking Techniques/41. Attacking and Hacking Windows.mp4  232.85 MB
Section 6 - Windows and Linux Post-Exploitation Techniques/43. Windows post exploitation techniques.mp4  185.68 MB
Section 6 - Windows and Linux Post-Exploitation Techniques/44. Linux post exploitation techniques.mp4  159.37 MB