File | Size |
---|
1. Introduction/1. Angular Security Course Helicopter View.mp4 | 21.17 MB |
1. Introduction/1. Angular Security Course Helicopter View.vtt | 2.47 kB |
1. Introduction/2. The Typescript Jumpstart Ebook.html | 6.02 kB |
1. Introduction/2.1 Typescript_Jumpstart_Book_Udemy.pdf.pdf | 757.61 kB |
1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.mp4 | 60.61 MB |
1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.vtt | 5.03 kB |
1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.mp4 | 14.79 MB |
1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.vtt | 7.02 kB |
1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.mp4 | 8.11 MB |
1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.vtt | 71.93 MB |
1. Introduction/6. Guided Tour Of The Sample Application.mp4 | 14.98 MB |
1. Introduction/6. Guided Tour Of The Sample Application.vtt | 7.49 kB |
10. Conclusion/1. Other Courses.mp4 | 30.36 MB |
10. Conclusion/1. Other Courses.vtt | 2.94 kB |
10. Conclusion/2. Bonus Lecture.html | 4.31 kB |
10. Conclusion/3. Conclusion and Key Takeaways.mp4 | 83.39 MB |
10. Conclusion/3. Conclusion and Key Takeaways.vtt | 10.37 kB |
2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.mp4 | 11.20 MB |
2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.vtt | 5.90 kB |
2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.mp4 | 22.24 MB |
2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.vtt | 10.95 kB |
2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.mp4 | 14.82 MB |
2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.vtt | 7.18 kB |
2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.mp4 | 21.62 MB |
2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.vtt | 10.76 kB |
3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.mp4 | 14.35 MB |
3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.vtt | 7.01 kB |
3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.mp4 | 13.16 MB |
3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.vtt | 7.62 kB |
3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.mp4 | 17.68 MB |
3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.vtt | 9.70 kB |
3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.mp4 | 14.41 MB |
3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.vtt | 6.67 kB |
3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.mp4 | 22.60 MB |
3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.vtt | 10.18 kB |
3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.mp4 | 13.56 MB |
3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.vtt | 6.19 kB |
3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.mp4 | 16.62 MB |
3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.vtt | 7.69 kB |
4. User Session Management/1. Switch Branches And User Session Management Section Introduction.mp4 | 15.63 MB |
4. User Session Management/1. Switch Branches And User Session Management Section Introduction.vtt | 8.77 kB |
4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.mp4 | 21.73 MB |
4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.vtt | 11.71 kB |
4. User Session Management/11. Implementing Logout - Destroying The User Session.mp4 | 20.83 MB |
4. User Session Management/11. Implementing Logout - Destroying The User Session.vtt | 9.67 kB |
4. User Session Management/12. User Login - Step-by-Step Implementation.mp4 | 17.28 MB |
4. User Session Management/12. User Login - Step-by-Step Implementation.vtt | 9.00 kB |
4. User Session Management/13. Finish Login Functionality and Section Conclusion.mp4 | 24.76 MB |
4. User Session Management/13. Finish Login Functionality and Section Conclusion.vtt | 12.29 kB |
4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.mp4 | 10.94 MB |
4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.vtt | 5.67 kB |
4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.mp4 | 18.63 MB |
4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.vtt | 9.93 kB |
4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.mp4 | 14.52 MB |
4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.vtt | 8.17 kB |
4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.mp4 | 20.43 MB |
4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.vtt | 9.86 kB |
4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.mp4 | 12.23 MB |
4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.vtt | 6.19 kB |
4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.mp4 | 6.86 MB |
4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.vtt | 3.31 kB |
4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.mp4 | 12.60 MB |
4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.vtt | 6.38 kB |
4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.mp4 | 25.51 MB |
4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.vtt | 12.56 kB |
5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.mp4 | 9.51 MB |
5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.vtt | 5.40 kB |
5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.mp4 | 4.82 MB |
5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.vtt | 2.70 kB |
5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.mp4 | 8.90 MB |
5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.vtt | 5.06 kB |
5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.mp4 | 18.66 MB |
5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.vtt | 7.97 kB |
5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.mp4 | 21.32 MB |
5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.vtt | 11.12 kB |
5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.mp4 | 18.45 MB |
5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.vtt | 10.13 kB |
5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.mp4 | 7.53 MB |
5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.vtt | 3.92 kB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.mp4 | 20.57 MB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.vtt | 10.21 kB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.mp4 | 21.68 MB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.vtt | 11.79 kB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.mp4 | 6.66 MB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.vtt | 3.96 kB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.mp4 | 13.50 MB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.vtt | 7.55 kB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.mp4 | 15.50 MB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.vtt | 8.59 kB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.mp4 | 10.29 MB |
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.vtt | 5.38 kB |
7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.mp4 | 23.86 MB |
7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.vtt | 12.14 kB |
7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.mp4 | 18.17 MB |
7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.vtt | 9.22 kB |
7. CSRF - Cross Site Request Forgery/3. Implementing the CSRF Double Submit Cookie Defense - Server Implementation.mp4 | 33.32 MB |
7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.mp4 | 21.96 MB |
7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.vtt | 11.67 kB |
8. JWT-based Authentication With Auth0/1. Auth0 Section Introduction - Using JWTs to Delegate Authentication To 3rd Party.mp4 | 14.14 MB |
8. JWT-based Authentication With Auth0/1. Auth0 Section Introduction - Using JWTs to Delegate Authentication To 3rd Party.vtt | 6.62 kB |
8. JWT-based Authentication With Auth0/10. Auth0 JWT-based Authentication - Backend Implementation.mp4 | 21.28 MB |
8. JWT-based Authentication With Auth0/10. Auth0 JWT-based Authentication - Backend Implementation.vtt | 12.16 kB |
8. JWT-based Authentication With Auth0/11. User Sign Up -Requesting Permission to Use Users Email.mp4 | 15.76 MB |
8. JWT-based Authentication With Auth0/11. User Sign Up -Requesting Permission to Use Users Email.vtt | 7.04 kB |
8. JWT-based Authentication With Auth0/12. User Signup and User Preferences - Frontend Implementation.mp4 | 12.77 MB |
8. JWT-based Authentication With Auth0/12. User Signup and User Preferences - Frontend Implementation.vtt | 6.46 kB |
8. JWT-based Authentication With Auth0/13. User Signup and User Profile - Server-Side Implementation.mp4 | 14.18 MB |
8. JWT-based Authentication With Auth0/13. User Signup and User Profile - Server-Side Implementation.vtt | 7.82 kB |
8. JWT-based Authentication With Auth0/14. Section Summary - The Main Benefit of JWTs.mp4 | 11.03 MB |
8. JWT-based Authentication With Auth0/14. Section Summary - The Main Benefit of JWTs.vtt | 4.97 kB |
8. JWT-based Authentication With Auth0/2. Integrating a 3rd Party Authentication Provider - Auth0.mp4 | 13.24 MB |
8. JWT-based Authentication With Auth0/2. Integrating a 3rd Party Authentication Provider - Auth0.vtt | 6.07 kB |
8. JWT-based Authentication With Auth0/3. Setting Up an Auth0 Externally Hosted Login Page.mp4 | 15.20 MB |
8. JWT-based Authentication With Auth0/3. Setting Up an Auth0 Externally Hosted Login Page.vtt | 7.51 kB |
8. JWT-based Authentication With Auth0/4. How does Auth0 Authentication Work Logging In a User.mp4 | 17.89 MB |
8. JWT-based Authentication With Auth0/4. How does Auth0 Authentication Work Logging In a User.vtt | 7.29 kB |
8. JWT-based Authentication With Auth0/5. Receiving The Auth0 JWT at Application Startup with parseHash.mp4 | 13.10 MB |
8. JWT-based Authentication With Auth0/5. Receiving The Auth0 JWT at Application Startup with parseHash.vtt | 6.98 kB |
8. JWT-based Authentication With Auth0/6. Storing the Auth0 JWT In Local Storage.mp4 | 11.21 MB |
8. JWT-based Authentication With Auth0/6. Storing the Auth0 JWT In Local Storage.vtt | 6.30 kB |
8. JWT-based Authentication With Auth0/7. Adapting the UI To the User Login Status.mp4 | 18.68 MB |
8. JWT-based Authentication With Auth0/7. Adapting the UI To the User Login Status.vtt | 9.88 kB |
8. JWT-based Authentication With Auth0/8. Angular HTTP Interceptor - Build an Authentication Interceptor.mp4 | 22.82 MB |
8. JWT-based Authentication With Auth0/8. Angular HTTP Interceptor - Build an Authentication Interceptor.vtt | 11.42 kB |
8. JWT-based Authentication With Auth0/9. JWT Authentication with express-jwt and JSON Web Key Set - Backend Design.mp4 | 21.88 MB |
8. JWT-based Authentication With Auth0/9. JWT Authentication with express-jwt and JSON Web Key Set - Backend Design.vtt | 8.79 kB |
9. RBAC Role-Based Authorization/1. RBAC Role-Based Authorization - Section Introduction.mp4 | 12.27 MB |
9. RBAC Role-Based Authorization/1. RBAC Role-Based Authorization - Section Introduction.vtt | 6.62 kB |
9. RBAC Role-Based Authorization/10. Authorization Router Guard Completed - Configuring a Factory Provider.mp4 | 19.74 MB |
9. RBAC Role-Based Authorization/10. Authorization Router Guard Completed - Configuring a Factory Provider.vtt | 10.31 kB |
9. RBAC Role-Based Authorization/2. Setting Up The RBAC Solution - Adding Roles to our JWT.mp4 | 19.27 MB |
9. RBAC Role-Based Authorization/2. Setting Up The RBAC Solution - Adding Roles to our JWT.vtt | 8.34 kB |
9. RBAC Role-Based Authorization/3. Angular RBAC Authorization - Solution Overview.mp4 | 7.86 MB |
9. RBAC Role-Based Authorization/3. Angular RBAC Authorization - Solution Overview.vtt | 5.08 kB |
9. RBAC Role-Based Authorization/4. Backend Express Authorization Route - Design Overview.mp4 | 14.03 MB |
9. RBAC Role-Based Authorization/4. Backend Express Authorization Route - Design Overview.vtt | 6.83 kB |
9. RBAC Role-Based Authorization/5. Backend Express Authorization Route - Implementation and Demo.mp4 | 9.08 MB |
9. RBAC Role-Based Authorization/5. Backend Express Authorization Route - Implementation and Demo.vtt | 6.99 kB |
9. RBAC Role-Based Authorization/6. The Admin Login As User Backend Service.mp4 | 14.56 MB |
9. RBAC Role-Based Authorization/6. The Admin Login As User Backend Service.vtt | 8.01 kB |
9. RBAC Role-Based Authorization/7. UI RBAC Authorization With The rbacAllow Structural Directive.mp4 | 14.33 MB |
9. RBAC Role-Based Authorization/7. UI RBAC Authorization With The rbacAllow Structural Directive.vtt | 7.35 kB |
9. RBAC Role-Based Authorization/8. The rbacAllow Structural Directive - Final Implementation and Demo.mp4 | 18.70 MB |
9. RBAC Role-Based Authorization/8. The rbacAllow Structural Directive - Final Implementation and Demo.vtt | 12.42 kB |
9. RBAC Role-Based Authorization/9. Authorization Router Guard - Initial Implementation.mp4 | 15.74 MB |
9. RBAC Role-Based Authorization/9. Authorization Router Guard - Initial Implementation.vtt | 8.42 kB |
Discuss.FTUForum.com.html | 31.89 kB |
FreeCoursesOnline.Me.html | 108.30 kB |
FTUForum.com.html | 100.44 kB |
How you can help Team-FTU.txt | 235.00 B |
NulledPremium.com.url | 163.00 B |
Torrent Downloaded From GloDls.to.txt | 84.00 B |
Torrent Downloaded From ProstyleX.com.txt | 38.00 B |