Building Data Breach and Subpoena Resistant Applications - Philly ETE 2017

Building Data Breach and Subpoena Resistant Applications - Philly ETE 2017

ChariotSolutions via YouTube Direct link

FURTHER READING/VIEWING

20 of 21

20 of 21

FURTHER READING/VIEWING

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Building Data Breach and Subpoena Resistant Applications - Philly ETE 2017

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 BACKGROUND - TRADITIONAL DISCUSSION
  3. 3 BACKGROUND - PLAYING THE ODDS
  4. 4 BACKGROUND - RECENT EXAMPLES
  5. 5 NIGHTMARE THREATS
  6. 6 NIGHTMARE EXAMPLE
  7. 7 RISKS ASSOCIATED WITH ENCRYPTION
  8. 8 SOLUTION BLUEPRINT
  9. 9 JSON WEB TOKENS (JWT)
  10. 10 COST-BASED CRYPTOGRAPHIC HASHES
  11. 11 EXAMPLE APPLICATION - WRITTEN TEST ADMINISTRATION
  12. 12 ADMIN SETUP
  13. 13 USER INVITATION
  14. 14 USER LOGIN
  15. 15 USER STARTS EXERCISE
  16. 16 USER FINISHES EXERCISE
  17. 17 SUBMISSION REVIEWED
  18. 18 FINAL DATA FOOTPRINT
  19. 19 EPILOGUE
  20. 20 FURTHER READING/VIEWING
  21. 21 NEXT STEPS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.