Chapter 47. Security II. Authentication. Access to Application

Table of Contents
References for this Lesson
Most Recent Lesson's Assignments
Hashing
Hashing / Encryption
Verify the Hash
Just One More Thing on Hashing
Authentication
A First Glimpse
The Manifestation
The Ingredients
Usage, Authentication
The Problem of, and the Solution to the Web's Statelessness
The Programming
Assignments Security 1
Handing In Assignments
Assignment Security 1.0
Assignment Security 1.1

References for this Lesson

[Wex19] Unit 5, Lessons 17, 22-24.

https://www.owasp.org/index.php/Main_Page generally, and in particular:

https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf

https://almanac.httparchive.org/en/2019/security

Alice and Bob Encryption