Search Results for - Narrowed by: Manning (Firm), publisher. - Application software -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Manning$002b$002528Firm$002529$00252C$002bpublisher.$002509Manning$002b$002528Firm$002529$00252C$002bpublisher.$0026qf$003dSUBJECT$002509Subject$002509Application$002bsoftware$002b--$002bSecurity$002bmeasures.$002509Application$002bsoftware$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-06-08T15:12:03Z Making sense of application security. ent://SD_ILS/0/SD_ILS:2332363 2024-06-08T15:12:03Z 2024-06-08T15:12:03Z by&#160;Saikali, Adib, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202229/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229">https://learning.oreilly.com/videos/~/10000MNHV202229</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202229/?ar">https://learning.oreilly.com/videos/~/10000MNHV202229/?ar</a><br/>Format:&#160;Video recording<br/> Spring Cloud gateway : resilience and security ent://SD_ILS/0/SD_ILS:2331946 2024-06-08T15:12:03Z 2024-06-08T15:12:03Z by&#160;Vitale, Thomas, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV2021127/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV2021127/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV2021127">https://learning.oreilly.com/videos/~/10000MNLV2021127</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV2021127/?ar">https://learning.oreilly.com/videos/~/10000MNLV2021127/?ar</a><br/>Format:&#160;Video recording<br/> Integration testing for Spring security implementations. ent://SD_ILS/0/SD_ILS:2334173 2024-06-08T15:12:03Z 2024-06-08T15:12:03Z by&#160;Spilcă, Laurenţiu, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNLV202196">https://learning.oreilly.com/videos/~/10000MNLV202196</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202196/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202196/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202196/?ar">https://learning.oreilly.com/videos/~/10000MNLV202196/?ar</a><br/>Format:&#160;Video recording<br/> Mistakes to avoid when implementing an OAuth2 system. ent://SD_ILS/0/SD_ILS:2334179 2024-06-08T15:12:03Z 2024-06-08T15:12:03Z by&#160;Spilcă, Laurenţiu, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202194/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202194/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202194">https://learning.oreilly.com/videos/~/10000MNLV202194</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202194/?ar">https://learning.oreilly.com/videos/~/10000MNLV202194/?ar</a><br/>Format:&#160;Video recording<br/> Top 10 mistakes with Spring security that make your app vulnerable. ent://SD_ILS/0/SD_ILS:2334196 2024-06-08T15:12:03Z 2024-06-08T15:12:03Z by&#160;Spilcă, Laurenţiu, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/10000MNLV202195/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNLV202195/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202195/?ar">https://learning.oreilly.com/videos/~/10000MNLV202195/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNLV202195">https://learning.oreilly.com/videos/~/10000MNLV202195</a><br/>Format:&#160;Video recording<br/>