OAuth and OAuth WRAP: defeating the password ...
No information avaiable
http://arstechnica.com/open-source/guides/2010/01/oauth-and-oauth-wrap-defeating-the-password-anti-pattern.ars
popularity:
oauth
security
authentication
api
identity
authorization
protocol
programming
reference
ssl
|
Drupal and Apache Web Site Security Checklist, part 1 | Nadeau Software
No information avaiable
similarity:
popularity:
drupal
security
apache
hosting
howto
reference
web
checklist
tips
launch
|
Starfield® Technologies, Inc. - Products: Web Security
No information avaiable
similarity:
popularity:
security
ssl
web
pki
certificates
certificate
encryption
development
company
|
Code Signing Certificates using Digital Signatures
No information avaiable
similarity:
popularity:
certificate
signing
code
ssl
code-signing
security
authentication
development
windows
software
|
:[ www.piotrbania.com ]:
No information avaiable
similarity:
popularity:
security
tools
debug
vulnerability
asm
hacking
windows
programming
virus
pentest
|
Daniel Franke's Home Page
... is http://openid.dfranke.us. ... dfranke@jabber.org/Feanor. 7C55674A 2919257B EE3E5F22 ... verified by fingering dfranke at feanor.dfranke.us (you can also use ...
similarity:
popularity:
programming
security
blog
haskell
toread
blogs
people
|
Ernest Delgado - user-registration-pattern-urp
No information avaiable
similarity:
popularity:
usability
patterns
registration
design
authentication
forms
reference
security
web
designpatterns
|
InfoQ: Open API分析、实践和思索
No information avaiable
similarity:
popularity:
api
openapi
architecture
programming
open
open_api
|
File.Network community : Windows XP file forum
No information avaiable
similarity:
popularity:
security
windows
computer
tools
reference
tech
|
Installation Completed | Trusteer
No information avaiable
similarity:
popularity:
security
banking
rapport
protection
trusteer
hsbc
software
computing
reference
fraud
|
Lucid Intelligence
Stuff about Lucid ... Every day the personal details of millions of potential victims of Identity ... The Lucid Intelligence database contains the details of ...
similarity:
popularity:
identity
fraud
personal
security
theft
search
criminal
intelligence
privacy
howto
|