security - www.bookmarks.dev/tagged/security
- Increasing Security with a Service Mesh - Christian Posta Explores the Capabilities of Istio
- OAuth 2.0 and OpenID Connect (in plain English) - YouTube
- 📆 published on: 2018-02-05
- tags: oauth2, openid-connect, security, authentication, authorization
- GitHub - docker/docker-bench-security
- tags: docker, security, devops
- github url
- awesome-nodejs-security
- tags: awesome, awesome-list, nodejs, security
- github url
- The Nuts and Bolts of API Security: Protecting Your Data at All Times - YouTube
- 📆 published on: 2015-05-20
- tags: api, security, oauth2, openid-connect, microservices
- API Keys ≠ Security: Why API Keys Are Not Enough
- Category:OWASP Top Ten Project - OWASP
- tags: security
- Public key fingerprint - Wikipedia
- tags: cryptography, security
- ISC 2 CISSP Certified Information Systems Security Professional Official Study Guide and Official Practice Tests Kit
- What Happens If Your JWT Is Stolen?
- Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
- tags: security, cryptography, x509, rfc
- Cryptography and IT Security
- tags: security, cryptography
- Confidentiality-Preserving Publish/Subscribe: a Survey
- 📆 published on: 2016-01-01
- tags: security, publish-subscribe
- Publish-Subscribe Threat Modeling – Security Compass
- 📆 published on: 2016-11-21
- tags: publish-subscribe, security
- RSA Signing and Encryption in Java
- 📆 published on: 2016-12-29
- tags: java, cryptography, security
- github url
- Web security
- Common Phishing Scams and How to Recognize and Avoid them
- 📆 published on: 2018-04-28
- tags: security
- PKI - trust & chain of trust -why, who and how? - YouTube
- SSL/TLS handshake Protocol - YouTube
- 📆 published on: 2018-02-11
- tags: security, cryptography, ssl, tls
- What is digital signature? - YouTube
- tags: security, cryptography
- How does a public key verify a signature? - Stack Overflow
- tags: security, cryptography
- Hashids - generate short unique ids from integers
- tags: javascript, ruby, go, java, lua, security
- github url
- Computer Systems Security - MIT OpenCourseWare
- Data Encryption Methods to Secure Your Cloud - Agile IT
- Cloud Security Alliance Blog - Cloud Security Alliance Industry Blog
- Passport.js
- tags: nodejs, security
- github url
- Role-based access control - Wikipedia
- tags: security, roles, access-control
- The Essential Guide to Machine Data
- An Introduction To Securing a Cloud Environment
- AWS Security Best Practices
- Recovery point objective - Wikipedia
- tags: cloud, security, business-process
- Recovery time objective - Wikipedia
- tags: cloud, security, business-process
- Online RSA Key Generator
- Generate a SHA-256 encrypted hash
- How Digital Signatures Work
- tags: security, encryption
- What is Phishing and Phishing Scams
- The STRIDE Threat Model
- tags: security
- What Is a Firewall? - Cisco
- STRIDE (security) - Wikipedia
- tags: security
- Ransomware - Wikipedia
- tags: security
- Spoofing attack - Wikipedia
- tags: networking, security, glossary
- Public Key Cryptography: RSA Encryption Algorithm - YouTube
- 📆 published on: 2012-07-30
- tags: security, cryptography, encryption, rsa
- Virtual LAN - Wikipedia
- tags: security, networking
- Asymmetric encryption - Simply explained - YouTube
- 📆 published on: 2017-10-30
- tags: security, cryptography, encryption
- JSON Hijacking | You’ve Been Haacked
- git-crypt - transparent file encryption in git
- tags: git, security
- github url
- Building Secure JavaScript Applications
- 📆 published on: 2018-01-18
- tags: javascript, security
- awesome-security
- tags: security
- github url
- Cross-site Scripting (XSS) - OWASP
- tags: security
- git-secret - A bash-tool to store your private data inside a git repository.
- tags: git, security, cvs
- github url
- XSS (Cross Site Scripting) Prevention Cheat Sheet - OWASP
- tags: security, cheatsheet
- Node.js Security Overview
- Angular Authentication: Using the Http Client and Http Interceptors
- 📆 published on: 2017-07-18
- tags: angular, jwt, security, authentication
- 5 Steps to Add Modern Authentication to Legacy Apps Using JWTs
- JWT: The Complete Guide to JSON Web Tokens
- Crypto | Node.js Documentation
- SHA-256 hash calculator. Online SHA-256 hash generator. Mining Bitcoin
- OWASP Secure Coding Practices - Quick Reference Guide - OWASP
- tags: security
- Journey into cryptography | Computer science | Computing |
Khan Academy
- tags: security, cryptography
- OWASP Secure Headers Project - OWASP
- tags: security
- عُدَّة الأمان الرقمي
- تقنيات الاختراق المادي
- تأمين الشبكات اللاسلكية للمستخدم المنزلي
- OWASP Top 10 for .NET Developers
- OpenSSL Cookbook
- Intrusion Detection Systems with Snort
- How to deal with Passwords
- Handbook of Applied Cryptography
- CryptoParty Handbook
- Crypto 101 - Crypto for everyone
- A Graduate Course in Applied Cryptography
- UncomplicatedFirewall - Ubuntu Wiki
- HTTP Strict Transport Security - Wikipedia
- Cipherli.st - Strong Ciphers for Apache, nginx and Lighttpd
- How to Configure a Firewall with UFW
- Security Checklist — MongoDB Manual
- How To Change SSH Port in Ubuntu - idroot
- SSL Certificate Explained - YouTube