Jesse Head | Microsoft Press Books and Microsoft Official Curriculum (MOC), rapidshare download | Ol Parker

OWASP Top 10 #1 Injection and #2 Broken Authentication

OWASP Top 10 #1 Injection and #2 Broken Authentication
OWASP Top 10: #1 Injection and #2 Broken Authentication
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 37M | 170 MB
Genre: eLearning | Language: English


Download Now

CakePHP 3 Tutorial with User Authentication and Admin

CakePHP 3 Tutorial with User Authentication and Admin
CakePHP 3 Tutorial with User Authentication and Admin
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | Lec: 12 | 411 MB
Genre: eLearning | Language: English


Download Now

Online Login Authentication System without database

Online Login   Authentication System without database
Online Login / Authentication System without database
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 12 | 191 MB
Genre: eLearning | Language: English


Download Now

Authentication and Authorization in ASP.NET Core

Authentication and Authorization in ASP.NET Core
Authentication and Authorization in ASP.NET Core
MP4 | Video: AVC 1920x1080 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 308 MB
Genre: eLearning | Language: English


Download Now

Authenticating Users with Firebase Authentication Service Playbook

Authenticating Users with Firebase Authentication Service Playbook
Authenticating Users with Firebase Authentication Service Playbook
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch | Duration: 3h 39m | 729 MB
Genre: eLearning | Language: English | Level: Intermediate | + Exercise Files

Download Now

Noise Tolerant Data Authentication for Wireless Communication

Noise Tolerant Data Authentication for Wireless Communication

Noise Tolerant Data Authentication for Wireless Communication by Obaid Ur-Rehman
English | PDF,EPUB | 2018 | 80 Pages | ISBN : 3319789414 | 3.85 MB
This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect.
Download Now

Advances in User Authentication

http://i99.fastpic.ru/big/2018/0309/80/cea297ca05f9b3be03629bc1e1950880.jpg
Advances in User Authentication
by Dipankar Dasgupta and Arunava Roy
English | 2017 | ISBN: 3319588060 | 369 Pages | PDF | 19 MB
Download Now

Xamarin Development Authentication and Identity

Xamarin Development Authentication and Identity
Xamarin Development: Authentication and Identity
MP4 | Video: 720p | Duration: 02:22 | English | Subtitles: VTT | 267.0 MB
Download Now

RHCE Cert Prep Authentication with LDAP and Kerberos

RHCE Cert Prep Authentication with LDAP and Kerberos
RHCE Cert Prep: Authentication with LDAP and Kerberos
MP4 | Video: 720p | Duration: 1:36:06 | English | Subtitles: VTT | 187.8 MB



Download Now

Implementing Multi-Factor Authentication


Implementing Multi-Factor Authentication

Implementing Multi-Factor Authentication
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 43M | Lec: 7 | 107 MB
Genre: eLearning | Language: English
A simplified guide to understanding multi-factor authentication

Download Now