OAuth 2.0 Identity and Access Management Patterns
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.
Build web, client-side, desktop, and server-side...
Mastering Modern Web Penetration Testing
This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
Penetrate and secure your web application using various techniques
Get this comprehensive
Building an e-Commerce Application with MEAN
Develop an end-to-end, real-time e-commerce application using the MEAN stack
About This Book
Build all the main components of an e-commerce website and extend its high-quality features as per your needs
Professional Java for Web Applications
The comprehensive Wrox guide for creating Java web applications for the enterprise
This guide shows Java software developers and software engineers how to build complex web applications in an enterprise environment. You'll begin with an introduction to the Java Enterprise Edition and the basic web application, then set...
Identity and Data Security for Web Development: Best Practices
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...
Master the art of agile single page web application development with ClojureScript
About This Book
Set up interactive development workflows for the browser or Node.js thanks to the ClojureScript ecosystem
Learn the basics of interactive single page web app development taking advantage of...
|Result Page: 4 3 2 1 |