Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/04. Brute-force attacks.mp411.28MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/03. Sanitizing data.mp410.38MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/03. SQL injection.mp49.28MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/09. Multi-factor authentication.mp49.26MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/02. Validating input.mp49.25MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/02. Cross-site request forgery (CSRF).mp49.05MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/07. Session hijacking.mp48.56MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/08. Handling forgotten passwords.mp48.27MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/02. Salting passwords.mp48.13MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/05. Faked requests and forms.mp47.99MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/04. URL manipulation.mp47.83MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/06. Keeping credentials private.mp47.78MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/08. Smart logging.mp47.6MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/01. Credit card payments.mp47.57MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/11. Denial of service.mp47.54MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/05. Source code managers.mp47.35MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/03. What is a hacker.mp47.25MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/05. Using SSL for login.mp47.12MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/01. Cross-site scripting (XSS).mp47.08MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/02. Regular expression flaws.mp47.02MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/06. Database security.mp46.6MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/07. Regulating access privileges.mp46.12MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/01. Least privilege.mp46.07MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/07. Server security.mp45.92MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/01. Password encryption.mp45.76MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/02. Why security matters.mp45.72MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/05. Keeping code private.mp45.58MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/06. Cookie visibility and theft.mp45.25MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/0. Introduction/01. Introduction.mp44.82MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/05. Get in the security mind-set.mp44.76MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/09. Remote system execution.mp44.72MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/04. Total security is unachievable.mp44.71MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/06. Write a security policy.mp44.64MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/08. Session fixation.mp44.59MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/03. Never trust users.mp44.46MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/03. Password requirements.mp44.35MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/07. Blacklisting and whitelisting.mp44.13MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/08. Map exposure points and data passageways.mp43.64MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/5. Encryption and User Authentication/06. Protecting cookies.mp43.63MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/02. Simple is more secure.mp43.61MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/01. Regulating requests.mp43.58MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/06. Security through obscurity.mp43.55MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/05. Defense in depth.mp43.55MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/07. Keeping error messages vague.mp43.48MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/04. Buffer overflows.mp43.4MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/1. Security Overview/01. What is security.mp43.3MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/4. The Most Common Attacks/10. File-upload abuse.mp43.23MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/2. General Security Principles/04. Expect the unexpected.mp42.96MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/3. Filtering Input, Controlling Output/04. Labeling variables.mp42.96MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/6. Other Areas of Concern/03. Conversions and transformations.mp42.9MB
Lynda.com Foundations of Programming Web Security with Kevin Skoglund/7. Conclusion/01. Goodbye.mp41.47MB