Download link
File List
-
01. Overview/01. Overview.mp4 4.06 MB
02. HTTP Security Primer/01. Overview.mp4 1.05 MB
02. HTTP Security Primer/02. Transport Security.mp4 4.27 MB
02. HTTP Security Primer/03. X.509 Certificates.mp4 5.53 MB
02. HTTP Security Primer/04. SSL Handshake.mp4 9.02 MB
02. HTTP Security Primer/05. Developers and SSL.mp4 9.38 MB
02. HTTP Security Primer/06. Where to get Certificates from.mp4 4.76 MB
02. HTTP Security Primer/07. Creating Certificates.mp4 5.68 MB
02. HTTP Security Primer/08. Demo. Building an SSL Development Environment.mp4 52.2 MB
02. HTTP Security Primer/09. Demo. Command Line Tools and Self-hosting.mp4 24.02 MB
02. HTTP Security Primer/10. Demo. Fiddler and SSL Tracing.mp4 31.14 MB
02. HTTP Security Primer/11. Validating Certificates using .NET APIs.mp4 65.19 MB
02. HTTP Security Primer/12. Resources.mp4 1.85 MB
03. ASP.NET Web API Security Architecture/01. Overview.mp4 1.67 MB
03. ASP.NET Web API Security Architecture/02. The Security Pipeline.mp4 10.4 MB
03. ASP.NET Web API Security Architecture/03. OWIN-Katana Hosting.mp4 5.67 MB
03. ASP.NET Web API Security Architecture/04. OWIN Middleware.mp4 8.21 MB
03. ASP.NET Web API Security Architecture/05. Message Handler.mp4 2.76 MB
03. ASP.NET Web API Security Architecture/06. Authentication Filter.mp4 3.6 MB
03. ASP.NET Web API Security Architecture/07. Authorization Filter.mp4 3.1 MB
03. ASP.NET Web API Security Architecture/08. Accessing Client Identity.mp4 5.58 MB
03. ASP.NET Web API Security Architecture/09. Demo. Security Pipeline.mp4 75.65 MB
03. ASP.NET Web API Security Architecture/10. Demo. Hosting Options.mp4 23.49 MB
03. ASP.NET Web API Security Architecture/11. Summary.mp4 4.42 MB
03. ASP.NET Web API Security Architecture/12. Resources.mp4 751.07 KB
04. Classic Authentication and Katana Authentication Middleware/01. Overview.mp4 3.75 MB
04. Classic Authentication and Katana Authentication Middleware/02. Windows Authentication.mp4 8.12 MB
04. Classic Authentication and Katana Authentication Middleware/03. Demo. Windows Authentication.mp4 73.34 MB
04. Classic Authentication and Katana Authentication Middleware/04. Basic Authentication.mp4 7.71 MB
04. Classic Authentication and Katana Authentication Middleware/05. Excursion. Katana Authentication Middleware.mp4 8.81 MB
04. Classic Authentication and Katana Authentication Middleware/06. Demo. Basic Authentication.mp4 65.48 MB
04. Classic Authentication and Katana Authentication Middleware/07. X.509 Client Certificates.mp4 6.95 MB
04. Classic Authentication and Katana Authentication Middleware/08. Demo. Client Certificates and Combining Authentication Methods.mp4 91.03 MB
04. Classic Authentication and Katana Authentication Middleware/09. Demo. Self Hosting.mp4 30 MB
04. Classic Authentication and Katana Authentication Middleware/10. Summary.mp4 2.47 MB
05. JavaScript and Browser-based Clients/01. Overview.mp4 2.02 MB
05. JavaScript and Browser-based Clients/02. Same Origin Policy.mp4 6.12 MB
05. JavaScript and Browser-based Clients/03. Implicit Browser Authentication.mp4 2.95 MB
05. JavaScript and Browser-based Clients/04. Cross Site Request Forgery (CSRF).mp4 3.78 MB
05. JavaScript and Browser-based Clients/05. CSRF Mitigation.mp4 10.95 MB
05. JavaScript and Browser-based Clients/06. Demo. Implicit Authentication and CSRF.mp4 14.64 MB
05. JavaScript and Browser-based Clients/07. Demo. CSRF Mitigation using Anti-Forgery Tokens.mp4 26.35 MB
05. JavaScript and Browser-based Clients/08. Cross Origin Resource Sharing (CORS).mp4 15.62 MB
05. JavaScript and Browser-based Clients/09. Demo. CORS support in Web API.mp4 13.88 MB
05. JavaScript and Browser-based Clients/10. Summary.mp4 4.02 MB
06. Token-based Authentication - Part I/01. Overview.mp4 4.03 MB
06. Token-based Authentication - Part I/02. Modern Applications.mp4 7.26 MB
06. Token-based Authentication - Part I/03. Requirement and Complexity.mp4 8.92 MB
06. Token-based Authentication - Part I/04. OAuth2.mp4 13.16 MB
06. Token-based Authentication - Part I/05. Authorization Servers.mp4 2.7 MB
06. Token-based Authentication - Part I/06. Demo. Thinktecture AuthorizationServer.mp4 12.92 MB
06. Token-based Authentication - Part I/07. Trusted Applications.mp4 18.78 MB
06. Token-based Authentication - Part I/08. Demo. Resource Owner Credential Flow.mp4 23.62 MB
06. Token-based Authentication - Part I/09. Adding Refresh Tokens.mp4 9.21 MB
06. Token-based Authentication - Part I/10. Demo. Adding Refresh Tokens.mp4 30.54 MB
06. Token-based Authentication - Part I/11. Demo. AuthorizationServer and Resource Owner Flow.mp4 16.26 MB
06. Token-based Authentication - Part I/12. Excursion. JSON Web Tokens.mp4 3.11 MB
07. Token-based Authentication - Part II/01. Native or Browser-based Clients.mp4 12.51 MB
07. Token-based Authentication - Part II/02. Implicit Flow.mp4 32.63 MB
07. Token-based Authentication - Part II/03. Confidential Clients.mp4 6.47 MB
07. Token-based Authentication - Part II/04. Demo. Authorization Code Flow.mp4 16.77 MB
07. Token-based Authentication - Part II/05. Federation and Delegation.mp4 11.91 MB
07. Token-based Authentication - Part II/06. Demo. Assertion Flow.mp4 34 MB
07. Token-based Authentication - Part II/07. Summary.mp4 3.95 MB
07. Token-based Authentication - Part II/08. Resources.mp4 3.62 MB
08. Authorization/01. Overview.mp4 2.15 MB
08. Authorization/02. Client vs. User Authorization.mp4 5.68 MB
08. Authorization/03. Authorization Options.mp4 4.74 MB
08. Authorization/04. AuthorizeAttribute Usage and Internals.mp4 12.31 MB
08. Authorization/05. Custom Authorization Logic.mp4 8.9 MB
08. Authorization/06. Imperative Authorization.mp4 2.48 MB
08. Authorization/07. Demo. Authorization.mp4 54.14 MB
08. Authorization/08. Summary.mp4 3.29 MB
Exercise Files/webapi-v2-security.zip 5.93 MB
Download Info
-
Tips
“Pluralsight - Web API v2 Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.