Found 1,570 presentations matching your search
Kerberos provides a centralized authentication server whose function is to authenticate users to ser...
This presentation was Part 2 for the Serverless Application Authentication.
This presentation, Protecting Web Applications The Role of Authentication and Authorization in a Ful...
Secure. Scalable. Simple. Swipe through to see how FastAPI and JWT redefine authentication for moder...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Security Requirements in IoT Architecture - Security in Enabling Technologies - Security Concerns in...
This presentation is Part 1 of the Serverless Application Authentication Series. Amazon Cognito is ...
Securing .NET services is paramount for protecting applications and data. Employing encryption, stro...
Discover the cutting-edge integration of artificial intelligence in facial and biometric authenticat...
various applications, such as daily activity monitoring and sports performance analysis. However, w...
SIM cards have been witnessing increasing adoption with the growing use of smartphones and other dev...
By mastering authentication and authorization, participants are well-prepared to develop secure and ...
We love developing applications, but sometimes we overlook critical security aspects, especially in ...
My Youtube Channel:- https://www.youtube.com/channel/UCTSeqoJEf28oJB7cqfkq7ZQ This presentation ex...
Firebase is a comprehensive app development platform that provides a suite of tools and services to ...
Identities Secure: Protecting Digital Identities in a Connected World In today’s connected digita...
1) One-Time Password (OTP) SMS Service: Strengthening Security and Authentication 2) What Is OTP ...
Unit 1 of Enterprise Java introduces the core concepts of the Java EE platform, focusing on its arch...
Cryptography and network security notes syllabus as per William stallings.. Introduction to securit...
The OAuth 2.0 authorization framework is a protocol that allows a user to grant a third-party web si...
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Cal...
Module 2 Lectures 4 hrs. Cryptography and Cryptanalysis: Introduction to Cryptography, Symmetric key...
The Salesforce platform offers system as well as application level security capabilities for buildin...
This InfosecTrain material unveils a comprehensive checklist for conducting effective web applicatio...