|
You are here |
kevinjmurphy.com | ||
| | | | |
www.adamalbrecht.com
|
|
| | | | | UPDATE: There have been some changes in the JWT Gem that make some of the below not work exactly right (it'll still be about 90% the same). Specifically, they added expiration support. See my post on the same topic, but using React.js. The server side code in this post will work just as well with Angular. | |
| | | | |
www.schneems.com
|
|
| | | | | This document is all about deciphering behavior of Ruby code using nothing but Ruby code. I recommend you get familiar with a debugger like pry-debugger, thi... | |
| | | | |
www.amberbit.com
|
|
| | | | | ||
| | | | |
opensource.net
|
|
| | | This series explores the critical security principles every Python web developer needs. While hard and fast rules like avoiding plaintext passwords and custom security algorithms are essential, a deeper understanding of broader security principles is equally important.This first post delves into fundamental security best practices, ranging from general principles to specific Python-related techniques. | ||