Mistakes to avoid when implementing an OAuth2 system.
How to avoid faults when implementing an OAuth 2 system.
Clasificación: | Libro Electrónico |
---|---|
Formato: | Electrónico Video |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
Manning Publications,
[2021]
|
Edición: | [First edition]. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework /
por: Bihis, Charles
Publicado: (2015) -
OAuth 2.0 identity and access management patterns : a practical hands-on guide to implementing secure API authorization flow scenariaos with OAuth 2.0 /
por: Spasovski, Martin
Publicado: (2013) -
Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework /
por: Bihis, Charles
Publicado: (2015) -
Top 10 mistakes with Spring security that make your app vulnerable.
Publicado: (2021) -
Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE /
por: Siriwardena, Prabath
Publicado: (2014)