[pluralsight-training.net] Enterprise Library Security and Cryptography Application Blocks

wmv   Hot:230   Size:138.92 MB   Created:2017-09-02 15:43:37   Update:2021-12-12 20:23:43  

File List

  • 1. Security Block Overview and Configuration/1. Introduction.wmv 1.51 MB
    1. Security Block Overview and Configuration/2. What The Security Block Does.wmv 5.15 MB
    1. Security Block Overview and Configuration/3. Why Use It.wmv 2.46 MB
    1. Security Block Overview and Configuration/4. AzMan.wmv 7.45 MB
    1. Security Block Overview and Configuration/5. Configuring.wmv 11.73 MB
    1. Security Block Overview and Configuration/6. Summary.wmv 1.87 MB
    2. Using the Security Block/1. Introduction.wmv 1.49 MB
    2. Using the Security Block/2. Caching an Identity.wmv 10 MB
    2. Using the Security Block/3. Using a Cached Credential.wmv 3.03 MB
    2. Using the Security Block/4. Caching Principals.wmv 4.83 MB
    2. Using the Security Block/5. Expiring Credentials.wmv 5.8 MB
    2. Using the Security Block/6. Configuring the Default Authorization Provider.wmv 13.55 MB
    2. Using the Security Block/7. Using AzMan.wmv 14.48 MB
    2. Using the Security Block/8. Summary.wmv 1.83 MB
    3. The Cryptography Block/1. Introduction.wmv 1.29 MB
    3. The Cryptography Block/2. What Is In The Block.wmv 1.69 MB
    3. The Cryptography Block/3. Why You Should Use It.wmv 2.63 MB
    3. The Cryptography Block/4. Understanding Encryption.wmv 1.82 MB
    3. The Cryptography Block/5. Configuration.wmv 17.03 MB
    3. The Cryptography Block/6. Basic Encryption.wmv 8.24 MB
    3. The Cryptography Block/7. Encrypting Objects.wmv 6.32 MB
    3. The Cryptography Block/8. Hashing.wmv 12.93 MB
    3. The Cryptography Block/9. Summary.wmv 1.79 MB

Download Info

  • Tips

    “[pluralsight-training.net] Enterprise Library Security and Cryptography Application Blocks” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.