zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[DesireCourse.Com] Udemy - Angular 7 Security Masterclass (with FREE E-Book)
magnet:?xt=urn:btih:27ea961f9cca627d7116f3f3348a4b9e4bc4077e&dn=[DesireCourse.Com] Udemy - Angular 7 Security Masterclass (with FREE E-Book)
磁力链接详情
文件列表详情
27ea961f9cca627d7116f3f3348a4b9e4bc4077e
infohash:
72
文件数量
1.27 GB
文件大小
2019-5-3 08:09
创建日期
2024-11-8 18:02
最后访问
相关分词
DesireCourse
Com
Udemy
-
Angular
7
Security
Masterclass
with
FREE
E-Book
1. Introduction/1. Angular Security Course Helicopter View.mp4 7.81 MB
1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.mp4 14.53 MB
1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.mp4 14.79 MB
1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.mp4 8.11 MB
1. Introduction/6. Guided Tour Of The Sample Application.mp4 14.98 MB
10. Conclusion/1. Other Courses.mp4 29.37 MB
10. Conclusion/3. Conclusion and Key Takeaways.mp4 166.99 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.mp4 11.2 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.mp4 22.24 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.mp4 14.82 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.mp4 21.62 MB
3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.mp4 14.35 MB
3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.mp4 13.16 MB
3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.mp4 17.68 MB
3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.mp4 14.41 MB
3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.mp4 22.6 MB
3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.mp4 13.56 MB
3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.mp4 16.62 MB
4. User Session Management/1. Switch Branches And User Session Management Section Introduction.mp4 15.63 MB
4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.mp4 21.73 MB
4. User Session Management/11. Implementing Logout - Destroying The User Session.mp4 20.83 MB
4. User Session Management/12. User Login - Step-by-Step Implementation.mp4 17.28 MB
4. User Session Management/13. Finish Login Functionality and Section Conclusion.mp4 24.76 MB
4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.mp4 10.94 MB
4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.mp4 18.63 MB
4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.mp4 14.52 MB
4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.mp4 20.43 MB
4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.mp4 12.23 MB
4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.mp4 6.86 MB
4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.mp4 12.6 MB
4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.mp4 25.51 MB
5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.mp4 9.51 MB
5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.mp4 4.82 MB
5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.mp4 8.9 MB
5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.mp4 18.66 MB
5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.mp4 21.32 MB
5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.mp4 18.45 MB
5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.mp4 7.53 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.mp4 20.57 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.mp4 21.68 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.mp4 6.66 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.mp4 13.5 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.mp4 15.5 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.mp4 10.29 MB
7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.mp4 23.86 MB
7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.mp4 18.17 MB
7. CSRF - Cross Site Request Forgery/3. Implementing the CSRF Double Submit Cookie Defense - Server Implementation.mp4 33.32 MB
7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.mp4 21.96 MB
8. JWT-based Authentication With Auth0/1. Auth0 Section Introduction - Using JWTs to Delegate Authentication To 3rd Party.mp4 14.14 MB
8. JWT-based Authentication With Auth0/10. Auth0 JWT-based Authentication - Backend Implementation.mp4 21.28 MB
8. JWT-based Authentication With Auth0/11. User Sign Up -Requesting Permission to Use Users Email.mp4 15.76 MB
8. JWT-based Authentication With Auth0/12. User Signup and User Preferences - Frontend Implementation.mp4 12.77 MB
8. JWT-based Authentication With Auth0/13. User Signup and User Profile - Server-Side Implementation.mp4 14.18 MB
8. JWT-based Authentication With Auth0/14. Section Summary - The Main Benefit of JWTs.mp4 11.03 MB
8. JWT-based Authentication With Auth0/2. Integrating a 3rd Party Authentication Provider - Auth0.mp4 13.24 MB
8. JWT-based Authentication With Auth0/3. Setting Up an Auth0 Externally Hosted Login Page.mp4 15.2 MB
8. JWT-based Authentication With Auth0/4. How does Auth0 Authentication Work Logging In a User.mp4 17.89 MB
8. JWT-based Authentication With Auth0/5. Receiving The Auth0 JWT at Application Startup with parseHash.mp4 13.1 MB
8. JWT-based Authentication With Auth0/6. Storing the Auth0 JWT In Local Storage.mp4 11.21 MB
8. JWT-based Authentication With Auth0/7. Adapting the UI To the User Login Status.mp4 18.68 MB
8. JWT-based Authentication With Auth0/8. Angular HTTP Interceptor - Build an Authentication Interceptor.mp4 22.82 MB
8. JWT-based Authentication With Auth0/9. JWT Authentication with express-jwt and JSON Web Key Set - Backend Design.mp4 21.88 MB
9. RBAC Role-Based Authorization/1. RBAC Role-Based Authorization - Section Introduction.mp4 12.27 MB
9. RBAC Role-Based Authorization/10. Authorization Router Guard Completed - Configuring a Factory Provider.mp4 19.74 MB
9. RBAC Role-Based Authorization/2. Setting Up The RBAC Solution - Adding Roles to our JWT.mp4 19.27 MB
9. RBAC Role-Based Authorization/3. Angular RBAC Authorization - Solution Overview.mp4 7.86 MB
9. RBAC Role-Based Authorization/4. Backend Express Authorization Route - Design Overview.mp4 14.03 MB
9. RBAC Role-Based Authorization/5. Backend Express Authorization Route - Implementation and Demo.mp4 9.08 MB
9. RBAC Role-Based Authorization/6. The Admin Login As User Backend Service.mp4 14.56 MB
9. RBAC Role-Based Authorization/7. UI RBAC Authorization With The rbacAllow Structural Directive.mp4 14.33 MB
9. RBAC Role-Based Authorization/8. The rbacAllow Structural Directive - Final Implementation and Demo.mp4 18.7 MB
9. RBAC Role-Based Authorization/9. Authorization Router Guard - Initial Implementation.mp4 15.74 MB
其他位置