关于“Identify Application Vulnerabilities with Security Command Center”的评价

评论

Sauvik S. · 评论over 1 year之前

Karen M. · 评论over 1 year之前

Tanusree S. · 评论over 1 year之前

Ahmad A. · 评论over 1 year之前

Arjun S. · 评论over 1 year之前

Shubham G. · 评论over 1 year之前

Jagannath P. · 评论over 1 year之前

Chetan T. · 评论over 1 year之前

Akhilesh Roshan G. · 评论over 1 year之前

Akash S. · 评论over 1 year之前

Mohammed Z. · 评论over 1 year之前

Soumya Ranjan D. · 评论over 1 year之前

Aryan S. · 评论over 1 year之前

Excellent

Bhavya G. · 评论over 1 year之前

Lavisha M. · 评论over 1 year之前

Pradip S. · 评论over 1 year之前

Web Security Scanner infinity loading, it's already more than 30 minute but still queue

Rifaldi B. · 评论over 1 year之前

Farah R. · 评论over 1 year之前

Putu W. · 评论over 1 year之前

nice

Jerald C. · 评论over 1 year之前

Ondosan S. · 评论over 1 year之前

The instructions, as written, are completely broken. The provided app requires the Flask Python module to run. The default VM instance build does not include this, and the instructions do not include how to install Flask. For users who are not python devs, they may not be familiar with this and it would prevent them from completing the lab. Additionally, considering as this is a security course, Google should be using best practices, which include setting up a virtualenv. The downloaded tarball includes a requirements.txt file, but no mention of using it to install Flask or setup a venv. Additionally, the default instance doesn't even include pip either. Come on, Google, do better.

Chris M. · 评论over 1 year之前

Sagar B. · 评论over 1 year之前

我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。