Introduction -- Password encryption, hashing, and salting -- Identity security fundamentals -- Securing the login with OAuth 2 and OpenID connect -- Alternate methods of identification -- Hardening web applications -- Data transmission security
Notes
Includes index
Online resource; title from title page (Safari, viewed June 13, 2016)