589689.xyz

[ ] PluralSight - JWT Fundamentals

  • 收录时间:2023-06-28 10:41:10
  • 文件大小:261MB
  • 下载次数:1
  • 最近下载:2023-06-28 10:41:10
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/3. The JWT Use Case.mp4 14MB
  2. ~Get Your Files Here !/6. JWT Security Best Practices/6. Alternatives to JWTs.mp4 11MB
  3. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/3. JWT Encryption with JWE.mp4 10MB
  4. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/11. Demo - JWTs in C# with Microsoft.IdentityModel.mp4 10MB
  5. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/04. Using Standard Claim Types for Common JWT Functionality.mp4 10MB
  6. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/02. How to Create a JWT.mp4 10MB
  7. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/7. The JOSE Standards.mp4 10MB
  8. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/6. When Not to Use JWTs.mp4 10MB
  9. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/10. Demo - JWTs in JavaScript with jose.mp4 10MB
  10. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/05. JWTs in Use - OpenID Connect’s Identity Token.mp4 9MB
  11. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/09. Demo - JWTs in Python with Authlib.mp4 9MB
  12. ~Get Your Files Here !/6. JWT Security Best Practices/2. Trust No One, Rely on Existing Relationships.mp4 9MB
  13. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/2. What Is a JWT.mp4 8MB
  14. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/06. JWTs in Use - JWT Profile for OAuth Access Tokens.mp4 8MB
  15. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/4. How JWTs Are Typically Used.mp4 7MB
  16. ~Get Your Files Here !/6. JWT Security Best Practices/4. JWT Revocation.mp4 6MB
  17. ~Get Your Files Here !/6. JWT Security Best Practices/5. Proof of Possession.mp4 6MB
  18. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/5. Choosing the Right Encryption Algorithm.mp4 6MB
  19. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/4. Signing Algorithm - RSASSA-PKCS1-v1_5 (e.g. RS256).mp4 6MB
  20. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/2. Understanding Digital Signatures and Signing Keys.mp4 6MB
  21. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/03. How to Validate a JWT.mp4 6MB
  22. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/6. Signing Algorithm - ECDSA (e.g. ES256).mp4 5MB
  23. ~Get Your Files Here !/02/why-json-web-tokens-jwts-slides.pdf 5MB
  24. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/5. When to Use JWTs.mp4 5MB
  25. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/3. JSON Web Algorithms (JWA) and JWS.mp4 5MB
  26. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/2. Understanding Encryption.mp4 5MB
  27. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/07. Useful JWT Tools.mp4 4MB
  28. ~Get Your Files Here !/06/jwt-security-best-practices-slides.pdf 4MB
  29. ~Get Your Files Here !/04/json-web-signature-jws-in-depth-slides.pdf 3MB
  30. ~Get Your Files Here !/03/using-json-web-tokens-jwts-slides.pdf 3MB
  31. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/8. Digital Signatures vs. Message Authentication Codes (e.g. HS256).mp4 3MB
  32. ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 3MB
  33. ~Get Your Files Here !/6. JWT Security Best Practices/3. Rely on Standardized Claims to Prevent Misuse.mp4 3MB
  34. ~Get Your Files Here !/05/json-web-encryption-jwe-in-depth-slides.pdf 3MB
  35. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/4. When to Use JWE.mp4 3MB
  36. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/7. Signing Algorithm - EdDSA.mp4 3MB
  37. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/9. Summary.mp4 2MB
  38. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/5. Signing Algorithm - RSASSA-PSS (e.g. PS256).mp4 2MB
  39. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/12. Summary.mp4 2MB
  40. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/1. Overview.mp4 2MB
  41. ~Get Your Files Here !/6. JWT Security Best Practices/1. Overview.mp4 2MB
  42. ~Get Your Files Here !/6. JWT Security Best Practices/7. Summary.mp4 2MB
  43. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/8. Summary.mp4 2MB
  44. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/01. Overview.mp4 2MB
  45. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/6. Summary.mp4 2MB
  46. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/1. Overview.mp4 1MB
  47. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/08. JWT Libraries.mp4 1MB
  48. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/1. Overview.mp4 1MB
  49. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/3. The JWT Use Case.vtt 10KB
  50. ~Get Your Files Here !/6. JWT Security Best Practices/6. Alternatives to JWTs.vtt 10KB
  51. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/04. Using Standard Claim Types for Common JWT Functionality.vtt 9KB
  52. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/6. When Not to Use JWTs.vtt 8KB
  53. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/02. How to Create a JWT.vtt 8KB
  54. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/3. JWT Encryption with JWE.vtt 7KB
  55. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/05. JWTs in Use - OpenID Connect’s Identity Token.vtt 7KB
  56. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/4. How JWTs Are Typically Used.vtt 7KB
  57. ~Get Your Files Here !/6. JWT Security Best Practices/2. Trust No One, Rely on Existing Relationships.vtt 7KB
  58. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/06. JWTs in Use - JWT Profile for OAuth Access Tokens.vtt 5KB
  59. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/2. What Is a JWT.vtt 5KB
  60. ~Get Your Files Here !/6. JWT Security Best Practices/5. Proof of Possession.vtt 5KB
  61. ~Get Your Files Here !/6. JWT Security Best Practices/4. JWT Revocation.vtt 5KB
  62. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/7. The JOSE Standards.vtt 5KB
  63. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/6. Signing Algorithm - ECDSA (e.g. ES256).vtt 5KB
  64. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/5. Choosing the Right Encryption Algorithm.vtt 5KB
  65. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/3. JSON Web Algorithms (JWA) and JWS.vtt 5KB
  66. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/2. Understanding Encryption.vtt 4KB
  67. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/11. Demo - JWTs in C# with Microsoft.IdentityModel.vtt 4KB
  68. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/5. When to Use JWTs.vtt 4KB
  69. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/09. Demo - JWTs in Python with Authlib.vtt 4KB
  70. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/10. Demo - JWTs in JavaScript with jose.vtt 4KB
  71. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/03. How to Validate a JWT.vtt 4KB
  72. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/2. Understanding Digital Signatures and Signing Keys.vtt 4KB
  73. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/4. Signing Algorithm - RSASSA-PKCS1-v1_5 (e.g. RS256).vtt 3KB
  74. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/07. Useful JWT Tools.vtt 3KB
  75. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/8. Digital Signatures vs. Message Authentication Codes (e.g. HS256).vtt 3KB
  76. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/4. When to Use JWE.vtt 3KB
  77. ~Get Your Files Here !/6. JWT Security Best Practices/3. Rely on Standardized Claims to Prevent Misuse.vtt 2KB
  78. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/7. Signing Algorithm - EdDSA.vtt 2KB
  79. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/12. Summary.vtt 2KB
  80. ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 2KB
  81. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/9. Summary.vtt 2KB
  82. ~Get Your Files Here !/6. JWT Security Best Practices/7. Summary.vtt 2KB
  83. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/8. Summary.vtt 2KB
  84. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/1. Overview.vtt 2KB
  85. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/01. Overview.vtt 2KB
  86. ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/5. Signing Algorithm - RSASSA-PSS (e.g. PS256).vtt 2KB
  87. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/6. Summary.vtt 2KB
  88. ~Get Your Files Here !/6. JWT Security Best Practices/1. Overview.vtt 2KB
  89. ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/1. Overview.vtt 2KB
  90. ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/08. JWT Libraries.vtt 1KB
  91. ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/1. Overview.vtt 1KB
  92. ~Get Your Files Here !/Bonus Resources.txt 386B
  93. Get Bonus Downloads Here.url 179B