Chapter 50. Application Security, Loose Ends

Table of Contents
50.1. References for this Lesson
50.2. Most Recent Lesson's Assignments
50.3. 2FA, Two Factor Authentication
50.3.1. Whatis?
50.3.2. Implementation af 2FA. Howto?
50.4. Logging. Server and Application
50.5. Injections, SQL, and Others
50.6. Helmet - A Security Helmet
50.7. Assignments Security AS.5
50.7.1. Assignment Security AS.5.0

50.1. References for this Lesson