Linked e-resources

Details

1. Introduction
2. The Hands-On Environment
3. Threat Modelling
4. Transport and Encryption
5. Installing and Configuring Services
6. APIs and Endpoints
7. Cookies and User Input
8. Cross-Site Requests
9. Password Management.-10. Authentication and Authorization
11. OAuth2
12. Logging and Monitoring
13. Third-Party and Supply Chain Security
14. Further Resources.

Browse Subjects

Show more subjects...

Statistics

from
to
Export