~Get Your Files Here !/02/manually-securing-a-cli-application-slides.pdf
6.6 MB
~Get Your Files Here !/03/adding-authentication-to-a-restful-api-with-spring-security-and-spring-boot-slides.pdf
4.7 MB
~Get Your Files Here !/04/creating-and-maintaining-a-user-base-for-your-restful-api-slides.pdf
3.5 MB
~Get Your Files Here !/05/implementing-oidc-authentication-with-keycloak-slides.pdf
7.8 MB
~Get Your Files Here !/06/adding-authorization-to-the-restful-api-endpoints-slides.pdf
938.5 KB
~Get Your Files Here !/07/adding-authorization-to-the-business-logic-services-slides.pdf
1.6 MB
~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.mp4
33.9 MB
~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.vtt
3 KB
~Get Your Files Here !/08. Auditing Access to the Application/02. Auditing User Access to a Spring Application.mp4
4.5 MB
~Get Your Files Here !/08. Auditing Access to the Application/02. Auditing User Access to a Spring Application.vtt
4.3 KB
~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.mp4
12.8 MB
~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.vtt
4.9 KB
~Get Your Files Here !/08. Auditing Access to the Application/04. Auditing Access to Data in a Spring Application.mp4
4.2 MB
~Get Your Files Here !/08. Auditing Access to the Application/04. Auditing Access to Data in a Spring Application.vtt
4.3 KB
~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.mp4
12.2 MB
~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.vtt
4.3 KB
~Get Your Files Here !/08. Auditing Access to the Application/06. Auditing Changes to Data and Storing Historical Data with Hibernate Envers.mp4
2.7 MB
~Get Your Files Here !/08. Auditing Access to the Application/06. Auditing Changes to Data and Storing Historical Data with Hibernate Envers.vtt
2.7 KB
~Get Your Files Here !/08. Auditing Access to the Application/07. Demo - Integrating Hibernate Envers to NekoShlink.mp4
8.1 MB
~Get Your Files Here !/08. Auditing Access to the Application/07. Demo - Integrating Hibernate Envers to NekoShlink.vtt
2.6 KB
~Get Your Files Here !/08. Auditing Access to the Application/08. Auditing Changes to Data and Storing Historical Data with JaVers.mp4
1.7 MB
~Get Your Files Here !/08. Auditing Access to the Application/08. Auditing Changes to Data and Storing Historical Data with JaVers.vtt
2 KB
~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.mp4
11.2 MB
~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.vtt
3.7 KB
~Get Your Files Here !/08. Auditing Access to the Application/10. Summary.mp4
872.8 KB
~Get Your Files Here !/08. Auditing Access to the Application/10. Summary.vtt
783 B
~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.mp4
38.8 MB
~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.vtt
3.5 KB
~Get Your Files Here !/08/auditing-access-to-the-application-slides.pdf
1.6 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
4.2 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
2.6 KB
~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.mp4
49.1 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.vtt
5.1 KB
~Get Your Files Here !/2. Manually Securing a CLI Application/2. An Overview of the Sample Application - NekoShlink.mp4
9.2 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/2. An Overview of the Sample Application - NekoShlink.vtt
7.4 KB
~Get Your Files Here !/2. Manually Securing a CLI Application/3. Demo - Getting Familiar with NekoShlink.mp4
6.9 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/3. Demo - Getting Familiar with NekoShlink.vtt
3.4 KB
~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.mp4
11.4 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.vtt
10.2 KB
~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.mp4
23 MB
~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.vtt
9.3 KB
~Get Your Files Here !/2. Manually Securing a CLI Application/6. Summary.mp4
749.7 KB
~Get Your Files Here !/2. Manually Securing a CLI Application/6. Summary.vtt
756 B
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.mp4
39.4 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.vtt
5 KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/2. The NekoShlink REST Project.mp4
3.4 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/2. The NekoShlink REST Project.vtt
3.7 KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/3. Demo - Getting Familiar with the NekoShlink REST .mp4
7.6 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/3. Demo - Getting Familiar with the NekoShlink REST .vtt
3.2 KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.mp4
18.7 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.vtt
8.4 KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/5. Transport Layer Security (TLS) and Server X.509 C.mp4
4.1 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/5. Transport Layer Security (TLS) and Server X.509 C.vtt
3.9 KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.mp4
12.9 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.vtt
7.1 KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/7. Mutual Transport Layer Security (mTLS) and Client.mp4
1.9 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/7. Mutual Transport Layer Security (mTLS) and Client.vtt
1.8 KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.mp4
14.4 MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.vtt
6.8 KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/9. Summary.mp4
903.1 KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/9. Summary.vtt
866 B
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.mp4
38 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.vtt
3.3 KB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/2. User Repositories in Spring Security.mp4
8.4 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/2. User Repositories in Spring Security.vtt
7 KB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.mp4
21 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.vtt
7.2 KB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/4. Spring Security Login Options.mp4
8.9 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/4. Spring Security Login Options.vtt
8.1 KB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/5. Demo - Basic and Form-based Challanges in NekoShlink.mp4
10.2 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/5. Demo - Basic and Form-based Challanges in NekoShlink.vtt
4.9 KB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/6. Summary.mp4
1.5 MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/6. Summary.vtt
1.8 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.mp4
44.6 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.vtt
4 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/2. OAuth2 Overview.mp4
6 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/2. OAuth2 Overview.vtt
5.5 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/3. OpenID Connect (OIDC) Overview.mp4
3.3 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/3. OpenID Connect (OIDC) Overview.vtt
3.5 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/4. OAuth2 (and OIDC) Servers.mp4
3 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/4. OAuth2 (and OIDC) Servers.vtt
2.6 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.mp4
16.1 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.vtt
6.5 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/6. OAuth2 Flows.mp4
3.3 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/6. OAuth2 Flows.vtt
3.2 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.mp4
10.6 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.vtt
4.5 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.mp4
16.4 MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.vtt
9 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/9. Summary.mp4
811.4 KB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/9. Summary.vtt
851 B
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.mp4
34.7 MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.vtt
3.2 KB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/2. Authorizing HTTP Endpoints.mp4
7.9 MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/2. Authorizing HTTP Endpoints.vtt
6.8 KB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/3. Demo - Role-based Authorization for NekoShlinks REST Endpoints.mp4
9.3 MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/3. Demo - Role-based Authorization for NekoShlinks REST Endpoints.vtt
3.7 KB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/4. Role Hierarchies.mp4