本站已收录 番号和无损神作磁力链接/BT种子 

[DesireCourse.Com] Udemy - Angular 7 Security Masterclass (with FREE E-Book)

种子简介

种子名称: [DesireCourse.Com] Udemy - Angular 7 Security Masterclass (with FREE E-Book)
文件类型: 视频
文件数目: 72个文件
文件大小: 1.27 GB
收录时间: 2019-5-3 08:09
已经下载: 3
资源热度: 209
最近下载: 2024-6-20 06:18

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:27ea961f9cca627d7116f3f3348a4b9e4bc4077e&dn=[DesireCourse.Com] Udemy - Angular 7 Security Masterclass (with FREE E-Book) 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[DesireCourse.Com] Udemy - Angular 7 Security Masterclass (with FREE E-Book).torrent
  • 1. Introduction/1. Angular Security Course Helicopter View.mp47.81MB
  • 1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.mp414.53MB
  • 1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.mp414.79MB
  • 1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.mp48.11MB
  • 1. Introduction/6. Guided Tour Of The Sample Application.mp414.98MB
  • 10. Conclusion/1. Other Courses.mp429.37MB
  • 10. Conclusion/3. Conclusion and Key Takeaways.mp4166.99MB
  • 2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.mp411.2MB
  • 2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.mp422.24MB
  • 2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.mp414.82MB
  • 2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.mp421.62MB
  • 3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.mp414.35MB
  • 3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.mp413.16MB
  • 3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.mp417.68MB
  • 3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.mp414.41MB
  • 3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.mp422.6MB
  • 3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.mp413.56MB
  • 3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.mp416.62MB
  • 4. User Session Management/1. Switch Branches And User Session Management Section Introduction.mp415.63MB
  • 4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.mp421.73MB
  • 4. User Session Management/11. Implementing Logout - Destroying The User Session.mp420.83MB
  • 4. User Session Management/12. User Login - Step-by-Step Implementation.mp417.28MB
  • 4. User Session Management/13. Finish Login Functionality and Section Conclusion.mp424.76MB
  • 4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.mp410.94MB
  • 4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.mp418.63MB
  • 4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.mp414.52MB
  • 4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.mp420.43MB
  • 4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.mp412.23MB
  • 4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.mp46.86MB
  • 4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.mp412.6MB
  • 4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.mp425.51MB
  • 5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.mp49.51MB
  • 5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.mp44.82MB
  • 5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.mp48.9MB
  • 5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.mp418.66MB
  • 5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.mp421.32MB
  • 5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.mp418.45MB
  • 5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.mp47.53MB
  • 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.mp420.57MB
  • 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.mp421.68MB
  • 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.mp46.66MB
  • 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.mp413.5MB
  • 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.mp415.5MB
  • 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.mp410.29MB
  • 7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.mp423.86MB
  • 7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.mp418.17MB
  • 7. CSRF - Cross Site Request Forgery/3. Implementing the CSRF Double Submit Cookie Defense - Server Implementation.mp433.32MB
  • 7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.mp421.96MB
  • 8. JWT-based Authentication With Auth0/1. Auth0 Section Introduction - Using JWTs to Delegate Authentication To 3rd Party.mp414.14MB
  • 8. JWT-based Authentication With Auth0/10. Auth0 JWT-based Authentication - Backend Implementation.mp421.28MB
  • 8. JWT-based Authentication With Auth0/11. User Sign Up -Requesting Permission to Use Users Email.mp415.76MB
  • 8. JWT-based Authentication With Auth0/12. User Signup and User Preferences - Frontend Implementation.mp412.77MB
  • 8. JWT-based Authentication With Auth0/13. User Signup and User Profile - Server-Side Implementation.mp414.18MB
  • 8. JWT-based Authentication With Auth0/14. Section Summary - The Main Benefit of JWTs.mp411.03MB
  • 8. JWT-based Authentication With Auth0/2. Integrating a 3rd Party Authentication Provider - Auth0.mp413.24MB
  • 8. JWT-based Authentication With Auth0/3. Setting Up an Auth0 Externally Hosted Login Page.mp415.2MB
  • 8. JWT-based Authentication With Auth0/4. How does Auth0 Authentication Work Logging In a User.mp417.89MB
  • 8. JWT-based Authentication With Auth0/5. Receiving The Auth0 JWT at Application Startup with parseHash.mp413.1MB
  • 8. JWT-based Authentication With Auth0/6. Storing the Auth0 JWT In Local Storage.mp411.21MB
  • 8. JWT-based Authentication With Auth0/7. Adapting the UI To the User Login Status.mp418.68MB
  • 8. JWT-based Authentication With Auth0/8. Angular HTTP Interceptor - Build an Authentication Interceptor.mp422.82MB
  • 8. JWT-based Authentication With Auth0/9. JWT Authentication with express-jwt and JSON Web Key Set - Backend Design.mp421.88MB
  • 9. RBAC Role-Based Authorization/1. RBAC Role-Based Authorization - Section Introduction.mp412.27MB
  • 9. RBAC Role-Based Authorization/10. Authorization Router Guard Completed - Configuring a Factory Provider.mp419.74MB
  • 9. RBAC Role-Based Authorization/2. Setting Up The RBAC Solution - Adding Roles to our JWT.mp419.27MB
  • 9. RBAC Role-Based Authorization/3. Angular RBAC Authorization - Solution Overview.mp47.86MB
  • 9. RBAC Role-Based Authorization/4. Backend Express Authorization Route - Design Overview.mp414.03MB
  • 9. RBAC Role-Based Authorization/5. Backend Express Authorization Route - Implementation and Demo.mp49.08MB
  • 9. RBAC Role-Based Authorization/6. The Admin Login As User Backend Service.mp414.56MB
  • 9. RBAC Role-Based Authorization/7. UI RBAC Authorization With The rbacAllow Structural Directive.mp414.33MB
  • 9. RBAC Role-Based Authorization/8. The rbacAllow Structural Directive - Final Implementation and Demo.mp418.7MB
  • 9. RBAC Role-Based Authorization/9. Authorization Router Guard - Initial Implementation.mp415.74MB