OAuth 2.0 Identity and Access Management Patterns
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.
Build web, client-side, desktop, and server-side...
Penetration Testing Bootcamp
Get practical demonstrations with in-depth explanations of complex security-related problems
Familiarize yourself with the most common web vulnerabilities
Get step-by-step guidance on managing testing results and reporting
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...
|Result Page: 13 12 11 10 9 8 7 6 5 4 |