Catalog Search Results
Author
Publisher
linkedin.com
Pub. Date
2023.
Language
English
Description
Learn how to work with OAuth and OpenID Connect to authenticate your applications.
While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant types and the required flows while securely protecting your secrets is challenging at best and catastrophic at worst. Fundamentally, professionals often struggle with OAuth because they misunderstand what it is, what use cases it is...
Author
Publisher
linkedin.com
Pub. Date
2018.
Language
English
Description
Learn how to work with OAuth and OpenID Connect to authenticate your applications.
While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant types and the required flows while securely protecting your secrets is challenging at best and catastrophic at worst. Fundamentally, professionals often struggle with OAuth because they misunderstand what it is, what use cases it is...
Author
Publisher
linkedin.com
Pub. Date
2019.
Language
English
Description
Learn how to work with OAuth and OpenID Connect to authenticate your applications.
While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant types and the required flows while securely protecting your secrets is challenging at best and catastrophic at worst. Fundamentally, professionals often struggle with OAuth because they misunderstand what it is, what use cases it is...
Author
Publisher
linkedin.com
Pub. Date
2020.
Language
English
Description
Learn how to build a headless app—a standalone app that uses WordPress as a back end—using OAuth2, JavaScript, and the WordPress REST API.
Headless applications use content management systems like WordPress as data resources and present the data independently. In this course, Morten Rand-Henriksen shows how to build these data-driven front-end applications on top of the WordPress REST API. Follow along with the evolution of the course project,...
Author
Publisher
linkedin.com
Pub. Date
2017.
Language
English
Description
Learn about the key principles of authentication, and how to authenticate your WordPress REST API using cookies, OAuth, and JWT.
To unlock the full potential of the WordPress REST API, you must understand how to create, read, edit, and delete content—tasks that can be performed only with the right authorization. In this course, explore several authentication methods for the WordPress REST API. Discover what authentication is and when you need it,...
Author
Publisher
linkedin.com
Pub. Date
2018.
Language
English
Description
Learn how to secure your apps and services with Spring Security and extensions such as LDAP, Active Directory, OAuth, and WebFlux.
Developers sometimes struggle to see their apps as attackers do. They don't automatically recognize the vulnerabilities. That is where frameworks like Spring Security come in. Spring Security offers built-in authentication and authorization features for securing your apps and services, and easy ways to extend the framework...
Author
Publisher
linkedin.com
Pub. Date
2022.
Language
English
Description
Learn how to secure your apps and services with Spring Security and extensions such as LDAP, Active Directory, OAuth, and WebFlux.
Developers sometimes struggle to see their apps as attackers do. They don't automatically recognize the vulnerabilities. That is where frameworks like Spring Security come in. Spring Security offers built-in authentication and authorization features for securing your apps and services, and easy ways to extend the framework...
Author
Publisher
linkedin.com
Pub. Date
2018.
Language
English
Description
Learn how to use the Xamarin.Auth library to authenticate mobile users and restrict or allow access to resources and functionality in your C# applications.
Learn how to use the Xamarin.Auth library to authenticate mobile users and restrict or allow access to resources and functionality in your C# applications. This course reviews the components involved in authentication, including identity providers, OAuth, tokens, and claims, and then dives straight...
Author
Publisher
linkedin.com
Pub. Date
2019.
Language
English
Description
Learn how to build dynamic, full-stack applications by pairing two robust frameworks—Angular and Django.
Put your Angular and Django REST knowledge to the test. In this course, join Rudolf Olah as he delves into the intricacies of pairing the two frameworks to build dynamic web applications. Throughout the course, Rudolf demonstrates how to wire together the two frameworks, add pagination, secure, and test your applications. Discover how to prepare...
Author
Publisher
linkedin.com
Pub. Date
2021.
Language
English
Description
Learn how to add user authentication into React apps, including email verification, password resets, and best practices.
User authentication is a critical part of virtually every website, yet few web developers know all the details behind how it works and how to use it to provide a good user experience. In this course, instructor Shaun Wassell dives into the details behind user authentication in the context of React and how to incorporate user authentication...
Author
Publisher
linkedin.com
Pub. Date
2019.
Language
English
Description
Review how to effectively implement user authentication and secure data across a system as you prepare for the Microsoft Azure Architect Technologies exam (AZ-300).
In order to create secure and reliable solutions in Azure, organizations must have strong identity and security designs. In this course, instructor Sharon Bennett covers the concepts you need to know to effectively design a strategy around user authentication and data security across...
Author
Publisher
linkedin.com
Pub. Date
2017.
Language
English
Description
Learn to secure Azure resources using managed identities, hybrid identities, and identity providers, and identify an appropriate security solution for your unique Azure deployment.
Protect your Azure deployments. Learn to secure Azure resources using managed identities, hybrid identities, and identity providers. Sharon Bennett discusses technologies such as Azure Active Directory, the AAD Graph Explorer, OAuth, SAML, Key Vault, and Active Directory...
Author
Publisher
linkedin.com
Pub. Date
2023.
Language
English
Description
Explore practical strategies to address and resolve common threats and security challenges in software-as-a-service (SaaS) applications.
Software as a service (SaaS) makes up the majority of all cloud consumption, but guidance for cloud security commonly focuses on IaaS. In this course, cybersecurity expert Jerich Beason shows you how to mitigate risks specific to SaaS applications. Secure SaaS applications by learning how to: Identify data, assets,...
Author
Publisher
linkedin.com
Pub. Date
2023.
Language
English
Description
Learn how to design identity, governance, and monitoring solutions in Microsoft Azure.
Begin your preparations for the Microsoft Azure Solutions Architect Expert (AZ-305) Exam with this series of courses. In this first course, go over how to design identity governance, and monitoring solutions. Explore logging and monitoring, including logging for virtual machines and using event alerts, log analytics, a resource graph, and more. Learn about authentication...
In Marina
Didn't find what you need? Items that were published more than six months ago and which are not owned by AACPL can be requested from other Marina libraries in Maryland.
Didn't find a newly published title?
Looking for a title that was published in the past six months? You can submit a purchase suggestion. Please do not submit purchase suggestions for titles that have not yet been published. Submit Request