TorBT - Torrents and Magnet Links Search Engine

[ TutGator.com ] PluralSight - Securing REST Services Using Spring Security 5

File Name
Size
Get Bonus Downloads Here.url
178 B
~Get Your Files Here !/02/manually-securing-a-cli-application-slides.pdf
6.6 MB
~Get Your Files Here !/03/adding-authentication-to-a-restful-api-with-spring-security-and-spring-boot-slides.pdf
4.7 MB
~Get Your Files Here !/04/creating-and-maintaining-a-user-base-for-your-restful-api-slides.pdf
3.5 MB
~Get Your Files Here !/05/implementing-oidc-authentication-with-keycloak-slides.pdf
7.8 MB
~Get Your Files Here !/06/adding-authorization-to-the-restful-api-endpoints-slides.pdf
938 kB
~Get Your Files Here !/07/adding-authorization-to-the-business-logic-services-slides.pdf
1.6 MB
~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.mp4
34 MB
~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.vtt
3.0 kB
~Get Your Files Here !/08. Auditing Access to the Application/02. Auditing User Access to a Spring Application.mp4
4.5 MB
~Get Your Files Here !/08. Auditing Access to the Application/02. Auditing User Access to a Spring Application.vtt
4.3 kB
~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.mp4
13 MB
~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.vtt
4.9 kB
~Get Your Files Here !/08. Auditing Access to the Application/04. Auditing Access to Data in a Spring Application.mp4
4.2 MB
~Get Your Files Here !/08. Auditing Access to the Application/04. Auditing Access to Data in a Spring Application.vtt
4.3 kB
~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.mp4
12 MB
~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.vtt
4.3 kB
~Get Your Files Here !/08. Auditing Access to the Application/06. Auditing Changes to Data and Storing Historical Data with Hibernate Envers.mp4
2.7 MB
~Get Your Files Here !/08. Auditing Access to the Application/06. Auditing Changes to Data and Storing Historical Data with Hibernate Envers.vtt
2.7 kB
~Get Your Files Here !/08. Auditing Access to the Application/07. Demo - Integrating Hibernate Envers to NekoShlink.mp4
8.1 MB
~Get Your Files Here !/08. Auditing Access to the Application/07. Demo - Integrating Hibernate Envers to NekoShlink.vtt
2.6 kB
~Get Your Files Here !/08. Auditing Access to the Application/08. Auditing Changes to Data and Storing Historical Data with JaVers.mp4
1.7 MB
~Get Your Files Here !/08. Auditing Access to the Application/08. Auditing Changes to Data and Storing Historical Data with JaVers.vtt
2.0 kB
~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.mp4
11 MB
~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.vtt
3.7 kB
~Get Your Files Here !/08. Auditing Access to the Application/10. Summary.mp4
873 kB
~Get Your Files Here !/08. Auditing Access to the Application/10. Summary.vtt
783 B
~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.mp4
39 MB
~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.vtt
3.5 kB
~Get Your Files Here !/08/auditing-access-to-the-application-slides.pdf
1.6 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
4.2 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
2.6 kB
~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.mp4
49 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.vtt
5.1 kB
~Get Your Files Here !/2. Manually Securing a CLI Application/2. An Overview of the Sample Application - NekoShlink.mp4
9.2 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/2. An Overview of the Sample Application - NekoShlink.vtt
7.4 kB
~Get Your Files Here !/2. Manually Securing a CLI Application/3. Demo - Getting Familiar with NekoShlink.mp4
6.9 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/3. Demo - Getting Familiar with NekoShlink.vtt
3.4 kB
~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.mp4
11 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.vtt
10 kB
~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.mp4
23 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.vtt
9.3 kB
~Get Your Files Here !/2. Manually Securing a CLI Application/6. Summary.mp4
750 kB
~Get Your Files Here !/2. Manually Securing a CLI Application/6. Summary.vtt
756 B
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.mp4
39 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.vtt
5.0 kB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/2. The NekoShlink REST Project.mp4
3.4 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/2. The NekoShlink REST Project.vtt
3.7 kB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/3. Demo - Getting Familiar with the NekoShlink REST .mp4
7.6 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/3. Demo - Getting Familiar with the NekoShlink REST .vtt
3.2 kB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.mp4
19 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.vtt
8.4 kB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/5. Transport Layer Security (TLS) and Server X.509 C.mp4
4.1 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/5. Transport Layer Security (TLS) and Server X.509 C.vtt
3.9 kB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.mp4
13 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.vtt
7.1 kB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/7. Mutual Transport Layer Security (mTLS) and Client.mp4
1.9 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/7. Mutual Transport Layer Security (mTLS) and Client.vtt
1.8 kB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.mp4
14 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.vtt
6.8 kB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/9. Summary.mp4
903 kB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/9. Summary.vtt
866 B
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.mp4
38 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.vtt
3.3 kB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/2. User Repositories in Spring Security.mp4
8.4 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/2. User Repositories in Spring Security.vtt
7.0 kB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.mp4
21 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.vtt
7.2 kB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/4. Spring Security Login Options.mp4
8.9 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/4. Spring Security Login Options.vtt
8.1 kB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/5. Demo - Basic and Form-based Challanges in NekoShlink.mp4
10 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/5. Demo - Basic and Form-based Challanges in NekoShlink.vtt
4.9 kB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/6. Summary.mp4
1.5 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/6. Summary.vtt
1.8 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.mp4
45 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.vtt
4.0 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/2. OAuth2 Overview.mp4
6.0 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/2. OAuth2 Overview.vtt
5.5 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/3. OpenID Connect (OIDC) Overview.mp4
3.3 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/3. OpenID Connect (OIDC) Overview.vtt
3.5 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/4. OAuth2 (and OIDC) Servers.mp4
3.0 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/4. OAuth2 (and OIDC) Servers.vtt
2.6 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.mp4
16 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.vtt
6.5 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/6. OAuth2 Flows.mp4
3.3 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/6. OAuth2 Flows.vtt
3.2 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.mp4
11 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.vtt
4.5 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.mp4
16 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.vtt
9.0 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/9. Summary.mp4
811 kB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/9. Summary.vtt
851 B
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.mp4
35 MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.vtt
3.2 kB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/2. Authorizing HTTP Endpoints.mp4
7.9 MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/2. Authorizing HTTP Endpoints.vtt
6.8 kB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/3. Demo - Role-based Authorization for NekoShlinks REST Endpoints.mp4
9.3 MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/3. Demo - Role-based Authorization for NekoShlinks REST Endpoints.vtt
3.7 kB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/4. Role Hierarchies.mp4
2.9 MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/4. Role Hierarchies.vtt
3.0 kB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/5. Demo - Using Role Hierarchies with NekoShlink Roles.mp4
7.9 MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/5. Demo - Using Role Hierarchies with NekoShlink Roles.vtt
2.7 kB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/6. Summary.mp4
904 kB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/6. Summary.vtt
983 B
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/1. Introduction.mp4
51 MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/1. Introduction.vtt
4.7 kB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/2. Applying Method-level Security to Web Endpoints.mp4
8.3 MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/2. Applying Method-level Security to Web Endpoints.vtt
6.5 kB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/3. Applying Method-level Security to Service Beans.mp4
4.7 MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/3. Applying Method-level Security to Service Beans.vtt
2.3 kB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/4. Declaring and Using Custom Security Annotations.mp4
3.4 MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/4. Declaring and Using Custom Security Annotations.vtt
1.9 kB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/5. The Need for RunAs Delegation.mp4
3.4 MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/5. The Need for RunAs Delegation.vtt
2.4 kB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/6. Demo - Using RunAs Delegation in NekoShlink.mp4
7.1 MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/6. Demo - Using RunAs Delegation in NekoShlink.vtt
2.5 kB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/7. Summary.mp4
1.6 MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/7. Summary.vtt
1.8 kB
~Get Your Files Here !/Bonus Resources.txt
386 B