[ ] PluralSight - JWT Fundamentals
- 收录时间:2023-06-28 10:41:10
- 文件大小:261MB
- 下载次数:1
- 最近下载:2023-06-28 10:41:10
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/3. The JWT Use Case.mp4 14MB
- ~Get Your Files Here !/6. JWT Security Best Practices/6. Alternatives to JWTs.mp4 11MB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/3. JWT Encryption with JWE.mp4 10MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/11. Demo - JWTs in C# with Microsoft.IdentityModel.mp4 10MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/04. Using Standard Claim Types for Common JWT Functionality.mp4 10MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/02. How to Create a JWT.mp4 10MB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/7. The JOSE Standards.mp4 10MB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/6. When Not to Use JWTs.mp4 10MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/10. Demo - JWTs in JavaScript with jose.mp4 10MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/05. JWTs in Use - OpenID Connect’s Identity Token.mp4 9MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/09. Demo - JWTs in Python with Authlib.mp4 9MB
- ~Get Your Files Here !/6. JWT Security Best Practices/2. Trust No One, Rely on Existing Relationships.mp4 9MB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/2. What Is a JWT.mp4 8MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/06. JWTs in Use - JWT Profile for OAuth Access Tokens.mp4 8MB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/4. How JWTs Are Typically Used.mp4 7MB
- ~Get Your Files Here !/6. JWT Security Best Practices/4. JWT Revocation.mp4 6MB
- ~Get Your Files Here !/6. JWT Security Best Practices/5. Proof of Possession.mp4 6MB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/5. Choosing the Right Encryption Algorithm.mp4 6MB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/4. Signing Algorithm - RSASSA-PKCS1-v1_5 (e.g. RS256).mp4 6MB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/2. Understanding Digital Signatures and Signing Keys.mp4 6MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/03. How to Validate a JWT.mp4 6MB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/6. Signing Algorithm - ECDSA (e.g. ES256).mp4 5MB
- ~Get Your Files Here !/02/why-json-web-tokens-jwts-slides.pdf 5MB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/5. When to Use JWTs.mp4 5MB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/3. JSON Web Algorithms (JWA) and JWS.mp4 5MB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/2. Understanding Encryption.mp4 5MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/07. Useful JWT Tools.mp4 4MB
- ~Get Your Files Here !/06/jwt-security-best-practices-slides.pdf 4MB
- ~Get Your Files Here !/04/json-web-signature-jws-in-depth-slides.pdf 3MB
- ~Get Your Files Here !/03/using-json-web-tokens-jwts-slides.pdf 3MB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/8. Digital Signatures vs. Message Authentication Codes (e.g. HS256).mp4 3MB
- ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 3MB
- ~Get Your Files Here !/6. JWT Security Best Practices/3. Rely on Standardized Claims to Prevent Misuse.mp4 3MB
- ~Get Your Files Here !/05/json-web-encryption-jwe-in-depth-slides.pdf 3MB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/4. When to Use JWE.mp4 3MB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/7. Signing Algorithm - EdDSA.mp4 3MB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/9. Summary.mp4 2MB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/5. Signing Algorithm - RSASSA-PSS (e.g. PS256).mp4 2MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/12. Summary.mp4 2MB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/1. Overview.mp4 2MB
- ~Get Your Files Here !/6. JWT Security Best Practices/1. Overview.mp4 2MB
- ~Get Your Files Here !/6. JWT Security Best Practices/7. Summary.mp4 2MB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/8. Summary.mp4 2MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/01. Overview.mp4 2MB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/6. Summary.mp4 2MB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/1. Overview.mp4 1MB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/08. JWT Libraries.mp4 1MB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/1. Overview.mp4 1MB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/3. The JWT Use Case.vtt 10KB
- ~Get Your Files Here !/6. JWT Security Best Practices/6. Alternatives to JWTs.vtt 10KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/04. Using Standard Claim Types for Common JWT Functionality.vtt 9KB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/6. When Not to Use JWTs.vtt 8KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/02. How to Create a JWT.vtt 8KB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/3. JWT Encryption with JWE.vtt 7KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/05. JWTs in Use - OpenID Connect’s Identity Token.vtt 7KB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/4. How JWTs Are Typically Used.vtt 7KB
- ~Get Your Files Here !/6. JWT Security Best Practices/2. Trust No One, Rely on Existing Relationships.vtt 7KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/06. JWTs in Use - JWT Profile for OAuth Access Tokens.vtt 5KB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/2. What Is a JWT.vtt 5KB
- ~Get Your Files Here !/6. JWT Security Best Practices/5. Proof of Possession.vtt 5KB
- ~Get Your Files Here !/6. JWT Security Best Practices/4. JWT Revocation.vtt 5KB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/7. The JOSE Standards.vtt 5KB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/6. Signing Algorithm - ECDSA (e.g. ES256).vtt 5KB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/5. Choosing the Right Encryption Algorithm.vtt 5KB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/3. JSON Web Algorithms (JWA) and JWS.vtt 5KB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/2. Understanding Encryption.vtt 4KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/11. Demo - JWTs in C# with Microsoft.IdentityModel.vtt 4KB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/5. When to Use JWTs.vtt 4KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/09. Demo - JWTs in Python with Authlib.vtt 4KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/10. Demo - JWTs in JavaScript with jose.vtt 4KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/03. How to Validate a JWT.vtt 4KB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/2. Understanding Digital Signatures and Signing Keys.vtt 4KB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/4. Signing Algorithm - RSASSA-PKCS1-v1_5 (e.g. RS256).vtt 3KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/07. Useful JWT Tools.vtt 3KB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/8. Digital Signatures vs. Message Authentication Codes (e.g. HS256).vtt 3KB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/4. When to Use JWE.vtt 3KB
- ~Get Your Files Here !/6. JWT Security Best Practices/3. Rely on Standardized Claims to Prevent Misuse.vtt 2KB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/7. Signing Algorithm - EdDSA.vtt 2KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/12. Summary.vtt 2KB
- ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 2KB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/9. Summary.vtt 2KB
- ~Get Your Files Here !/6. JWT Security Best Practices/7. Summary.vtt 2KB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/8. Summary.vtt 2KB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/1. Overview.vtt 2KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/01. Overview.vtt 2KB
- ~Get Your Files Here !/4. JSON Web Signature (JWS) in Depth/5. Signing Algorithm - RSASSA-PSS (e.g. PS256).vtt 2KB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/6. Summary.vtt 2KB
- ~Get Your Files Here !/6. JWT Security Best Practices/1. Overview.vtt 2KB
- ~Get Your Files Here !/2. Why JSON Web Tokens (JWTs)/1. Overview.vtt 2KB
- ~Get Your Files Here !/03. Using JSON Web Tokens (JWTs)/08. JWT Libraries.vtt 1KB
- ~Get Your Files Here !/5. JSON Web Encryption (JWE) in Depth/1. Overview.vtt 1KB
- ~Get Your Files Here !/Bonus Resources.txt 386B
- Get Bonus Downloads Here.url 179B