21st Century Prometheus [[electronic resource] ] : Managing CBRN Safety and Security Affected by Cutting-Edge Technologies / / edited by Maurizio Martellini, Ralf Trapp
| 21st Century Prometheus [[electronic resource] ] : Managing CBRN Safety and Security Affected by Cutting-Edge Technologies / / edited by Maurizio Martellini, Ralf Trapp |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XI, 370 p. 30 illus., 24 illus. in color.) |
| Disciplina | 358.3 |
| Soggetto topico |
Data protection
Biochemical engineering Politics and war Security Biochemical Engineering Military and Defence Studies |
| ISBN | 3-030-28285-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Part I The Changing CBRN Risk Landscape -- The XXI Century: The Epoch of Advanced Military Systems and Growing Vulnerabilities -- The Dark Side of Nuclear Energy: Risks of Proliferation from Domestic Fuel Cycle Technologies -- Chemical and Biological Risks in the 21st Century -- Neuroscience-Based Weapons -- Hybrid Emerging Threats and AI Information Warfare: The Story of the Cyber-AI Deception Machine -- Artificial Intelligence and Warfare -- Artificial Intelligence in Autonomous Weapon Systems -- Understanding the Threat Posed by COTS and Small UAVs Armed with CBW -- Education and Training as a Disruptive Dual Use Technology -- Part II Evolving Risk Mitigation Strategies and Technologies -- Detection and Identification Technologies for CBRN Agents -- Chemical Forensics -- Recent Developments in Clinical Toxicology and the Use of Weaponized Nerve Agents -- Diagnosing the Cause of Disease – Interactive Teaching Approaches -- Evaluation Systems for Biological Security Risk Mitigation Training and Education -- Biological Forensics. |
| Record Nr. | UNISA-996465353803316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
21st Century Prometheus : Managing CBRN Safety and Security Affected by Cutting-Edge Technologies / / edited by Maurizio Martellini, Ralf Trapp
| 21st Century Prometheus : Managing CBRN Safety and Security Affected by Cutting-Edge Technologies / / edited by Maurizio Martellini, Ralf Trapp |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XI, 370 p. 30 illus., 24 illus. in color.) |
| Disciplina | 358.3 |
| Soggetto topico |
Data protection
Biochemical engineering Politics and war Security Biochemical Engineering Military and Defence Studies |
| ISBN | 3-030-28285-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Part I The Changing CBRN Risk Landscape -- The XXI Century: The Epoch of Advanced Military Systems and Growing Vulnerabilities -- The Dark Side of Nuclear Energy: Risks of Proliferation from Domestic Fuel Cycle Technologies -- Chemical and Biological Risks in the 21st Century -- Neuroscience-Based Weapons -- Hybrid Emerging Threats and AI Information Warfare: The Story of the Cyber-AI Deception Machine -- Artificial Intelligence and Warfare -- Artificial Intelligence in Autonomous Weapon Systems -- Understanding the Threat Posed by COTS and Small UAVs Armed with CBW -- Education and Training as a Disruptive Dual Use Technology -- Part II Evolving Risk Mitigation Strategies and Technologies -- Detection and Identification Technologies for CBRN Agents -- Chemical Forensics -- Recent Developments in Clinical Toxicology and the Use of Weaponized Nerve Agents -- Diagnosing the Cause of Disease – Interactive Teaching Approaches -- Evaluation Systems for Biological Security Risk Mitigation Training and Education -- Biological Forensics. |
| Record Nr. | UNINA-9910410052803321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
5G Enabled Secure Wireless Networks / / edited by Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma
| 5G Enabled Secure Wireless Networks / / edited by Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XVIII, 200 p. 64 illus., 62 illus. in color.) |
| Disciplina | 621.382 |
| Soggetto topico |
Electrical engineering
Power electronics Data protection Electronics Microelectronics Application software Energy consumption Communications Engineering, Networks Power Electronics, Electrical Machines and Networks Security Electronics and Microelectronics, Instrumentation Information Systems Applications (incl. Internet) Energy Efficiency |
| ISBN | 3-030-03508-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter1: 5G Enabled Wireless Networks: A Security, Data and Privacy Perspective -- Chapter2: 5G Applications and Architectures -- Chapter3:A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks -- Chapter4: Physical Layer Security in 5G Hybrid Heterogeneous Networks -- Chapter5: Physical Layer Security of Energy Harvesting M2M Communication System -- Chapter6: Beam-Domain Full-Duplex Massive MIMO Transmission in the Cellular System. |
| Record Nr. | UNINA-9910337632503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
5G for Future Wireless Networks : First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings / / edited by Keping Long, Victor C.M. Leung, Haijun Zhang, Zhiyong Feng, Yonghui Li, Zhongshan Zhang
| 5G for Future Wireless Networks : First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings / / edited by Keping Long, Victor C.M. Leung, Haijun Zhang, Zhiyong Feng, Yonghui Li, Zhongshan Zhang |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XVI, 697 p. 319 illus.) |
| Disciplina | 621.3845 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computers, Special purpose
Computer simulation Artificial intelligence Data protection Computer system failures Special Purpose and Application-Based Systems Simulation and Modeling Artificial Intelligence Security System Performance and Evaluation |
| ISBN | 3-319-72823-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 28GHz MIMO Channel Characteristics Analysis for 5G Communication Systems -- A Caching Strategy Based on User Interest in Content-Centric Network -- Node Localization based on Multiple Radio Transmission -- Power Levels for Wireless Sensor Networks -- End-to-End Transmission Performance Optimization based Routing Selection Algorithm for Software Defined Networking -- Research on video services with QoE perception over future wireless networks -- Tree-LSTM Guided Attention Pooling of DCNN for Semantic Sentence Modeling -- Multi - Base Station Energy Cooperation Based on Nash Q - Learning Algorithm -- Crowdfunding assisted Cellular System Analysis and Application -- A Survey on Security Issues in Big Data of Ubiquitous Network -- Telecom Big Data based User Analysis and Application in Telecom Industry -- Coverage Optimization in Self-Organizing Small Cells -- Expectation Maximization for Multipath Detection in Wideband Signals -- Dynamic Resource Orchestration of Service Function -- Chaining In Network Function Virtualization -- Support Recovery for Multiband Spectrum Sensing Based on Modulated Wideband Converter with SwSOMP Algorithm -- Traffic Scheduling Algorithms for OFDM Based Radio Systems -- Coverage Performance in Cognitive Radio Networks with Self-Sustained Secondary Transmitters -- A Novel Algorithm of UAV-Mounted Base Station Placement and Frequency Allocation -- Throughput Analysis for Full-Duplex Based Device-to-Device Communications -- Joint Mode Selection and Resource Allocation in Underlaying D2D Communication -- PAPR Reduction with Amplitude Clipping and Subband Filter in Filtered-OFDM System -- Throughput Maximization for Two-Hop Decodeand-Forward Relay Channels with Non-Ideal Circuit Power -- Big Data-driven Vehicle Mobility Analysis and Design for 5G -- Complexity Analysis of Massive MIMO Signal Detection Algorithms Based on Factor Graph -- Per-Antenna Maximum Likelihood Detector for Massive MIMO -- Joint User-Association and Resource-Allocation in Virtualized C-RAN -- Adaptive Resource Allocation for Device-to-Device Aided Cellular Systems -- Radio Access Network -- Iterative Receiver with Gaussian and Mean-Field Approximation in Massive MIMO Systems -- Research and Application of Summer High Temperature Prediction Model Based on CART Algorithm -- Research on Peak-to-Average Power Ratio Reduction for FBMC-based 5G Transmission -- A Machine Learning based Engine Error Detection Method -- Beamforming Design for Physical Layer Security and Energy Efficiency Based on Base Station Cooperation. . |
| Record Nr. | UNINA-9910299313603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE
| 802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE |
| Pubbl/distr/stampa | New York. : , : IEEE, , 2020 |
| Descrizione fisica | 1 online resource (289 pages) |
| Disciplina | 004.68 |
| Soggetto topico |
Local area networks (Computer networks) - Standards
Metropolitan area networks (Computer networks) - Standards IEEE Standards Computer networks - Security measures - Standards Access control Authorization Media Access Protocol Authentication Security |
| ISBN | 1-5044-6440-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
IEEE 802.1X-2020 Standard
IEEE Standard for Local and Metropolitan Area Networks |
| Record Nr. | UNINA-9910389743803321 |
| New York. : , : IEEE, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE
| 802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE |
| Pubbl/distr/stampa | New York. : , : IEEE, , 2020 |
| Descrizione fisica | 1 online resource (289 pages) |
| Disciplina | 004.68 |
| Soggetto topico |
Local area networks (Computer networks) - Standards
Metropolitan area networks (Computer networks) - Standards IEEE Standards Computer networks - Security measures - Standards Access control Authorization Media Access Protocol Authentication Security |
| ISBN | 1-5044-6440-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
IEEE 802.1X-2020 Standard
IEEE Standard for Local and Metropolitan Area Networks |
| Record Nr. | UNISA-996574711503316 |
| New York. : , : IEEE, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Ad Hoc Networks : 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings / / edited by Yifeng Zhou, Thomas Kunz
| Ad Hoc Networks : 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings / / edited by Yifeng Zhou, Thomas Kunz |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (X, 217 p. 84 illus.) |
| Disciplina | 004.685 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Application software Electrical engineering Data protection Computers, Special purpose Computer simulation Computer Communication Networks Information Systems Applications (incl. Internet) Communications Engineering, Networks Security Special Purpose and Application-Based Systems Simulation and Modeling |
| ISBN | 3-319-74439-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band -- The Sound of Communication in Underwater Acoustic Sensor Networks -- Applying Utility Theory to Improve Autonomous Underwater Vehicle Mission Payload Planning and Replanning -- Challenges of Misbehavior Detection in Industrial Wireless Networks -- A New Look at an Old Attack: ARP spoofing to create routing loops in ad hoc networks -- Integrating Intrusion Response Funtionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture -- Source Mobility in Vehicular Named-Data Networking: An Overview -- Flow-level Simulation for Adaptive Routing Protocols in Vehicular Ad-hoc Networks -- Control Overhead Reduction In Cluster-Based VANET Routing Protocol -- Ariel Networks and Routing -- A Hierarchical Framework for Estimating the Performance of an Aerial Network -- An Efficient Routing and Interface Assignment Algorithm for Multi-Channel Multi-Interface (MCMI) Ad Hoc Networks -- Exploiting Multiple Beam Antennas for End-to-End Delay Reduction in Ad Hoc Networks -- Trajectory and Buffer Aware Message Forwarding for Multiple Cooperating UAVs in Message Ferry Networks Cellular Networks, Sensor Networks -- Caching and Computing at the Edge for Mobile -- Augmented Reality and Virtual Reality (AR/VR) in 5G -- Evaluation of a Location Reporting System for mmWave Communication -- Fair Scheduling of Two-Hop Transmission with Energy Harvesting -- EEHCCP: An Energy-Efficient Hybrid Clustering Communication Protocol for Wireless Sensor Network -- A model for self-deployment of autonomous mobile sensor network in an unknown indoor environment. |
| Record Nr. | UNINA-9910299292503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ad Hoc Networks : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers / / edited by Yifeng Zhou, Thomas Kunz
| Ad Hoc Networks : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers / / edited by Yifeng Zhou, Thomas Kunz |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XIV, 416 p. 176 illus.) |
| Disciplina | 004.685 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Computer security Computers, Special purpose Data protection Computer simulation Electrical engineering Computer Communication Networks Systems and Data Security Special Purpose and Application-Based Systems Security Simulation and Modeling Communications Engineering, Networks |
| ISBN | 3-319-51204-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Management of Surveillance Underwater Acoustic Networks -- Relative Localization for Small Wireless Sensor Networks -- Performance Study of the IEEE 802.15.6 Slotted Aloha Mechanism With Power Control in a Multiuser Environment -- New Selection Strategies of Actor’s Substitute in DARA for Connectivity Restoration in WSANs -- Asymmetric Multi-Way Ranging for Resource-Limited Nodes -- Comparison of RPL Routing Metrics on grids UAV and Vehicular Networks -- Communication and Coordination for Drone Networks 8 Intelligent Wireless AdHoc Routing Protocol and Controller for UAV Networks -- Theoretical Analysis of Obstruction’s influence on Data Dissemination in Vehicular Networks -- Performance Analysis for Traffic-aware Utility in Vehicular Ad Hoc Networks -- Investigation and Adaptation of Signal Propagation Models for a Mixed Outdoor-Indoor Scenario Using a Flying GSM Base Station Modelling and Analysis -- Optimizing Power Allocation in Wireless Networks: Are the Implicit Constraints Really Redundant? -- Towards Dynamic Capacity Management for the Masses -- Distance Distributions in Finite Ad Hoc Networks: Approaches, Applications, and Directions -- Towards More Realistic Network Simulations: Leveraging the System-Call Barrier -- 16 Resource Allocation for Relay-aided Cooperative Hospital Wireless Networks -- Improving the performance of challenged networks with controlled mobility -- SDN Coordination for CCN and FC Content Dissemination -- A Bandwidth Adaptation Scheme for Cloud Radio Access Networks -- Cooperative On-the-Fly Decision Making in Mobility-Controlled Multi Ferry Delay Tolerant Networks -- Multipath Routing Optimization with Interference Consideration in Wireless Ad hoc Network -- An Accurate Passive RFID Indoor Localization System based on SenseaTag and Zoning Algorithm Workshop on practical ad hoc network security and vulnerability -- Communication Links Vulnerability Model for Cyber Security Mitigation -- Entropy-Based Recommendation Trust Model for Machine to Machine Communications -- Reliability, Throughput and Latency Analysis of an Aerial Network -- Gender Assignment for Directional Full-Duplex FDD Nodes in a Multihop Wireless Network -- A Massive MIMO Panel Array at Ka-band with Flexible Patterns and Beam Steering Performance. |
| Record Nr. | UNINA-9910254844103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advanced API Security : OAuth 2.0 and Beyond / / by Prabath Siriwardena
| Advanced API Security : OAuth 2.0 and Beyond / / by Prabath Siriwardena |
| Autore | Siriwardena Prabath |
| Edizione | [2nd ed. 2020.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020 |
| Descrizione fisica | 1 online resource (xix, 449 pages) : illustrations |
| Disciplina | 005.1068 |
| Collana | Books for professionals by professionals |
| Soggetto topico |
Data protection
Computers, Special purpose Computer security Programming languages (Electronic computers) Security Special Purpose and Application-Based Systems Systems and Data Security Programming Languages, Compilers, Interpreters |
| ISBN |
9781484220504
1484220501 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. APIs Rule!.-2. Designing Security for APIs.-3. Securing APIs with Transport Layer Security (TLS).-4. OAuth 2.0 Fundamentals.-5. Edge Security with an API Gateway.-6. OpenID Connect (OIDC).-7. Message Level Security with JSON Web Signature.-8. Message Level Security with JSON Web Encryption.-9. OAuth 2.0 Profiles.-10. Accessing APIs via Native Mobile Apps.-11. OAuth 2.0 Token Binding.-12. Federating Access to APIs.-13. User Managed Access.-14. OAuth 2.0 Security -- 15. Patterns and Practices -- 16: A. The Evolution of Identity Delegation -- 17: B. OAuth 1.0 -- 18: C. How Transport Layer Security Works -- 19: D. UMA Evolution -- 20: E. Base64URL Encoding -- 21: F. Basic/Digest Authentication -- 22: G. OAuth 2.0 MAC Token Profile. |
| Altri titoli varianti | Advanced Application program interfaces security |
| Record Nr. | UNINA-9910369901303321 |
Siriwardena Prabath
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advanced API Security : Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE / / by Prabath Siriwardena
| Advanced API Security : Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE / / by Prabath Siriwardena |
| Autore | Siriwardena Prabath |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 |
| Descrizione fisica | 1 online resource (248 p.) |
| Disciplina |
004
004.6 |
| Soggetto topico |
Data protection
Software engineering Computers, Special purpose Security Software Engineering/Programming and Operating Systems Special Purpose and Application-Based Systems |
| ISBN |
9781430268178
1430268174 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Contents at a Glance""; ""Contents""; ""About the Author""; ""About the Technical Reviewer""; ""Acknowledgments""; ""Introduction""; ""Chapter 1: Managed APIs""; ""The API Evolution""; ""API vs. Managed API""; ""API vs. Service""; ""Discovering and Describing APIs""; ""Managed APIs in Practice""; ""Twitter API""; ""Salesforce API""; ""Summary""; ""Chapter 2: Security by Design""; ""Design Challenges""; ""User Comfort""; ""Performance""; ""Weakest Link""; ""Defense in Depth""; ""Insider Attacks""; ""Security by Obscurity""; ""Design Principles""; ""Least Privilege""; ""Fail-Safe Defaults""
""Economy of Mechanism""""Complete Mediation""; ""Open Design""; ""Separation of Privilege""; ""Least Common Mechanism""; ""Psychological Acceptability""; ""Confidentiality, Integrity, Availability (CIA)""; ""Confidentiality""; ""Integrity""; ""Availability""; ""Security Controls""; ""Authentication""; ""Something You Know""; ""Something You Have""; ""Something You Are""; ""Authorization""; ""Discretionary Access Control (DAC) vs. Mandatory Access Control (MAC)""; ""Nonrepudiation""; ""Auditing""; ""Security Patterns""; ""Direct Authentication Pattern""; ""Managing Credentials"" ""Biometric Authentication""""Sealed Green Zone Pattern""; ""Least Common Mechanism Pattern""; ""Brokered Authentication Pattern""; ""Policy-Based Access Control Pattern""; ""Threat Modeling""; ""Summary""; ""Chapter 3: HTTP Basic/Digest Authentication""; ""HTTP Basic Authentication""; ""HTTP Digest Authentication""; ""Summary""; ""Chapter 4: Mutual Authentication with TLS""; ""Evolution of TLS""; ""How TLS Works""; ""TLS Handshake""; ""Application Data Transfer""; ""Summary""; ""Chapter 5: Identity Delegation""; ""Direct Delegation vs. Brokered Delegation"" ""Evolution of Identity Delegation""""Google ClientLogin""; ""Google AuthSub""; ""Flickr Authentication API""; ""Yahoo! Browser-Based Authentication (BBAuth)""; ""Summary""; ""Chapter 6: OAuth 1.0""; ""The Token Dance""; ""Temporary-Credential Request Phase""; ""Resource-Owner Authorization Phase""; ""Token-Credential Request Phase""; ""Invoking a Secured Business API with OAuth 1.0""; ""Demystifying oauth_signature""; ""Three-Legged OAuth vs. Two-Legged OAuth""; ""OAuth WRAP""; ""Summary""; ""Chapter 7: OAuth 2.0""; ""OAuth WRAP""; ""Client Account and Password Profile"" ""Assertion Profile""""Username and Password Profile""; ""Web App Profile""; ""Rich App Profile""; ""Accessing a WRAP-Protected API""; ""WRAP to OAuth 2.0""; ""OAuth 2.0 Grant Types""; ""Authorization Code Grant Type""; ""Implicit Grant Type""; ""Resource Owner Password Credentials Grant Type""; ""Client Credentials Grant Type""; ""OAuth 2.0 Token Types""; ""OAuth 2.0 Bearer Token Profile""; ""OAuth 2.0 Client Types""; ""OAuth 2.0 and Facebook""; ""OAuth 2.0 and LinkedIn""; ""OAuth 2.0 and Salesforce""; ""OAuth 2.0 and Google""; ""Authentication vs. Authorization""; ""Summary"" ""Chapter 8: OAuth 2.0 MAC Token Profile"" |
| Record Nr. | UNINA-9910300476903321 |
Siriwardena Prabath
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||