RAR-files |
pccatsc-xqzt.rar |
50,000,000 |
E6BA59D8 |
pccatsc-xqzt.r00 |
50,000,000 |
B5CB9129 |
pccatsc-xqzt.r01 |
50,000,000 |
C7092EF2 |
pccatsc-xqzt.r02 |
50,000,000 |
6520A3AA |
pccatsc-xqzt.r03 |
50,000,000 |
4C9E71D8 |
pccatsc-xqzt.r04 |
17,652,462 |
FC02B26E |
|
Total size: |
267,652,462 |
|
|
Archived
files |
Cloud Computing and the Security Challenge\3.Explaining Cloud Computing\10.Cloud Deployment Models.mp4
[c83e0eede427ab25]
|
11,753,821 |
7EB7403C |
Cloud Computing and the Security Challenge\3.Explaining Cloud Computing\12.NIST Cloud Reference Model and Key Ecosystem Roles.mp4
[b5afda9cc21a4fb3]
|
12,115,086 |
61BC9AC6 |
Cloud Computing and the Security Challenge\3.Explaining Cloud Computing\14.Cloud Cross-cutting Aspects.mp4
[aee744caa7e97b9b]
|
8,041,379 |
1207C048 |
Cloud Computing and the Security Challenge\3.Explaining Cloud Computing\13.Cloud Computing Team Functions.mp4
[428cfe507846a5fd]
|
7,657,375 |
5763795C |
Cloud Computing and the Security Challenge\3.Explaining Cloud Computing\11.Cloud Service Models.mp4
[f7be6aef6705370]
|
29,733,676 |
4C06C07C |
Cloud Computing and the Security Challenge\4.Using Cloud Computing Components\15.Technology Services.mp4
[e87d2eddae320bcd]
|
27,138,608 |
C3B76D6B |
Cloud Computing and the Security Challenge\4.Using Cloud Computing Components\16.Notional Cloud Service Provide.mp4
[18f08278f8fae2c7]
|
16,208,249 |
C9A0D501 |
Cloud Computing and the Security Challenge\1.Course Overview\01.Course Overview.mp4
[f6f88bbdc7b364ba]
|
6,291,169 |
C1D0844A |
Cloud Computing and the Security Challenge\5.Recognizing Cloud Computing Threats\19.STRIDE Threat Model and Top Threats.mp4
[c93ee3c646a043ba]
|
14,473,131 |
902E22BD |
Cloud Computing and the Security Challenge\5.Recognizing Cloud Computing Threats\21.Cloud Attack Vectors and Security Considerations by Service Model.mp4
[966f31bebde2456d]
|
18,690,129 |
60CC69DE |
Cloud Computing and the Security Challenge\5.Recognizing Cloud Computing Threats\18.Risk Management.mp4
[965cdade3d82f913]
|
9,484,547 |
6608216E |
Cloud Computing and the Security Challenge\5.Recognizing Cloud Computing Threats\17.Design Principles of Secure Cloud Computing.mp4
[8b801bc282849459]
|
6,078,418 |
244514DB |
Cloud Computing and the Security Challenge\5.Recognizing Cloud Computing Threats\20.Demo - Treacherous 12.mp4
[5a91dea1a932d40c]
|
12,251,532 |
658A77AC |
Cloud Computing and the Security Challenge\2.Understanding Your Executives\02.How Did We Get Here (Cloud Computing History).mp4
[7b29d29cbc4530d4]
|
14,868,138 |
CCFA0CC3 |
Cloud Computing and the Security Challenge\2.Understanding Your Executives\04.Key Cloud Computing Characteristics.mp4
[d3aa92c9ab6e106c]
|
12,744,170 |
CB380DBB |
Cloud Computing and the Security Challenge\2.Understanding Your Executives\09.Demo - Transparency Reports Database.mp4
[4b834aa58d53321a]
|
5,303,362 |
C8B77897 |
Cloud Computing and the Security Challenge\2.Understanding Your Executives\08.Cloud Data Security.mp4
[f820ec82897f31ce]
|
13,948,401 |
B7E8A436 |
Cloud Computing and the Security Challenge\2.Understanding Your Executives\05.Cloud Computing Definitions.mp4
[c34a6cac0bd64369]
|
12,786,396 |
775A1BCB |
Cloud Computing and the Security Challenge\2.Understanding Your Executives\03.IT-as-a-service - Cloud Service Capabilities.mp4
[1a17065aa34eee1]
|
11,521,677 |
81196076 |
Cloud Computing and the Security Challenge\2.Understanding Your Executives\07.Why You Shouldn't Use Cloud Computing.mp4
[c81795f0ed7b479a]
|
11,623,642 |
26919E9E |
Cloud Computing and the Security Challenge\2.Understanding Your Executives\06.Why Use Cloud Computing.mp4
[1986a273a050f3ff]
|
4,934,866 |
6C864D3B |
Cloud Computing and the Security Challenge\3.Explaining Cloud Computing |
0 |
00000000 |
Cloud Computing and the Security Challenge\4.Using Cloud Computing Components |
0 |
00000000 |
Cloud Computing and the Security Challenge\1.Course Overview |
0 |
00000000 |
Cloud Computing and the Security Challenge\5.Recognizing Cloud Computing Threats |
0 |
00000000 |
Cloud Computing and the Security Challenge\2.Understanding Your Executives |
0 |
00000000 |
Cloud Computing and the Security Challenge |
0 |
00000000 |
|
Total size: |
267,647,772 |
|
|