You are here |
mazinahmed.net | ||
| | | |
conductofcode.io
|
|
| | | | How to create a ASP.NET Core Web API, secure it with JSON Web Tokens and explore it with Swagger UI and Postman. | |
| | | |
www.cossacklabs.com
|
|
| | | | How to implement OAuth in the context of mobile applications while avoiding security pitfalls? Practical steps on fortifying OAuth flow with PKCE, state parameter, managing secure redirections, and focusing on critical aspects during OAuth assessment in mobile environments. | |
| | | |
littlemaninmyhead.wordpress.com
|
|
| | | | After doing hundreds of security code reviews for companies ranging from small start-ups to large banks and telcos, and after reading hundreds of stack overflow posts on security, I have composed a list of the top 10 crypto problems I have seen. Bad crypto is everywhere, unfortunately. The frequency of finding crypto done correctly is | |
| | | |
www.antipope.org
|
|
| |