elhacker.INFO Downloads

[ index of contents ]

Copyright issues contact [email protected]
Icon  Name                                                                                      Size  
[Volver] Parent Directory - [TXT] 10. How to protect users without interrupting their work - notes for the examination.html 10 [Fichero PDF] 10.1 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.6M [TXT] 9. Isolating applications.vtt 6.3K [TXT] 9. Isolating applications.srt 7.2K [VID] 9. Isolating applications.mp4 17M [TXT] 8. EXERCISE Application control rules.vtt 12K [TXT] 8. EXERCISE Application control rules.srt 13K [VID] 8. EXERCISE Application control rules.mp4 27M [TXT] 7. Software restrictions policies.vtt 6.0K [TXT] 7. Software restrictions policies.srt 6.8K [VID] 7. Software restrictions policies.mp4 14M [TXT] 6. Blocking applications.vtt 7.7K [TXT] 6. Blocking applications.srt 8.7K [VID] 6. Blocking applications.mp4 18M [TXT] 5. System Center Configuration Manager.vtt 2.8K [TXT] 5. System Center Configuration Manager.srt 3.2K [VID] 5. System Center Configuration Manager.mp4 6.3M [TXT] 4. MS Update.vtt 6.7K [TXT] 4. MS Update.srt 7.5K [VID] 4. MS Update.mp4 16M [TXT] 3. Software updates.vtt 2.8K [TXT] 3. Software updates.srt 3.2K [VID] 3. Software updates.mp4 6.2M [TXT] 2. Managing applications.vtt 9.0K [TXT] 2. Managing applications.srt 10K [VID] 2. Managing applications.mp4 17M [TXT] 1. Here’s what you’ll learn in this module.vtt 1.0K [TXT] 1. Here’s what you’ll learn in this module.srt 1.2K [VID] 1. Here’s what you’ll learn in this module.mp4 3.1M