|
|
|
|
|
Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers ... | | Voice over IP SecurityVoice over IP Security
Security best practices derived from deep analysis of the latest VoIP network threats
Patrick Park
VoIP... | | Microsoft .NET Framework Security (One Off)Today, computing is dynamic and global. It is no longer practical to input or access data from a single computer. Microsoft .NET Framework allows you to use the same data for various digital devices. However, accessibility can lead to breaches in security. Therefore, this platform also provides several mechanisms for administrators and... |
|
|
| | | | Enterprise Java 2 Security: Building Secure and Robust J2EE Applications The purpose of this book is to illustrate the applicability of Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security technologies in building a secure enterprise infrastructure containing Java-based enterprise applications. With a pragmatic approach, the book explains why Java security... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |